Search Results

You searched for: subject "Computer security+Data processing." Remove constraint

Search Results

Cover image for Infrastructure security

Infrastructure security

Location
Access Content Online
Cover image for Security analytics

Security analytics

Location
Access Content Online
Cover image for The network security center

The network security center

Location Call # Status
Joyner - Fed Docs Stacks C 13.10:500-21/V.2 ✔ Available
Cover image for Considerations in the selection of security measures for automatic data processing systems

Considerations in the selection of security measures for automatic data processing systems

Location Call # Status
Joyner - Fed Docs Stacks C13.10:500-33 ✔ Available
Cover image for An analysis of computer security safeguards for detecting and preventing intentional computer misuse

An analysis of computer security safeguards for detecting and preventing intentional computer misuse

Location Call # Status
Joyner - Fed Docs Stacks C 13.10:500-25 ✔ Available
Cover image for Cloud security

Cloud security

Location
Access Content Online
Cover image for Cloud security

Cloud security

Location
Access Content Online
Cover image for Computer security in the federal government and the private sector

Computer security in the federal government and the private sector

Location Call # Status
Joyner - Fed Docs Stacks Y 4.G 74/9:S.HRG.98-440 ✔ Available