Search Results

You searched for: subject "Electronic data processing+Security measures." Remove constraint

Search Results

Cover image for The cloud security ecosystem

The cloud security ecosystem

Location
Access Content Online
Cover image for Computer security handbook

Computer security handbook

Location Call # Status
Joyner - General Stacks HF5548.37 .C64 1988 ✔ Available
Cover image for The Data Processing security game

The Data Processing security game

Location Call # Status
Joyner - General Stacks HF5548.2 .B36 1977 ✔ Available
Cover image for Security procedures for computer systems

Security procedures for computer systems

Location Call # Status
Joyner - General Stacks HF5548.2 .H4475 ✔ Available
Cover image for Nine steps to effective EDP loss control

Nine steps to effective EDP loss control

Location Call # Status
Joyner - General Stacks HF5548.2 .E224 1982 ✔ Available
Cover image for Computer security handbook

Computer security handbook

Location Call # Status
Joyner - General Stacks HF5548.2 .C58177 1973 ✔ Available
Cover image for Security standards for data processing

Security standards for data processing

Location Call # Status
Joyner - General Stacks HF5548.2.W655 1973 ✔ Available
Cover image for Infrastructure security

Infrastructure security

Location
Access Content Online
Cover image for Cyber security in parallel and distributed computing

Cyber security in parallel and distributed computing

Location
Access Content Online