Search Results
You searched for:
subject
"Electronic data processing+Security measures.+United States."
Remove constraint
Showing 21 - 30 of 63 results
Search Results
Military and civilian control of computer security issues
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/7:M 59/17 | ✔ Available |
Cyber-threats, information warfare, and critical infrastructure protection
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | UA929.95.E43 C67 2002 | ✔ Available |
Department of Defense trusted computer system evaluation criteria
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | D 1.2:C 73/8/985-2 | ✔ Available |
A Guide to understanding trusted distribution in trusted systems
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | D 1.79/4:008/VER.1 | ✔ Available |
A Guide to understanding identification and authentication in trusted systems
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | D 1.79/4:017/VER.1 | ✔ Available |
Computer security awareness training
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | ASK AT REFERENCE DESK | ✔ Available |
Problems associated with computer technology in Federal programs and private industry
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/6:C 73/11 | ✔ Available |