Search Results

You searched for: subject "Electronic data processing+Security measures.+United States." Remove constraint

Search Results

Cover image for Computer security in the federal government

Computer security in the federal government

Location Call # Status
Joyner - Fed Docs Stacks Y 4.C 73.7:S.HRG.105-1068 ✔ Available
Cover image for Computer security in the federal government and the private sector

Computer security in the federal government and the private sector

Location Call # Status
Joyner - Fed Docs Stacks Y 4.G 74/9:S.HRG.98-440 ✔ Available
Cover image for Implementation of the Computer Security Act

Implementation of the Computer Security Act

Location Call # Status
Joyner - Fed Docs Stacks Y 4.SCI 2:100/146 ✔ Available
Cover image for Guidelines for security of computer applications

Guidelines for security of computer applications

Location Call # Status
Joyner - Fed Docs Stacks C 13.52:73 ✔ Available
Cover image for Users' guide to computer crime: its commission, detection & prevention

Users' guide to computer crime: its commission, detection & prevention

Location Call # Status
Joyner - General Stacks HF5548.2 .L393 1974 ✔ Available
Cover image for Implementation of the Computer Security Act

Implementation of the Computer Security Act

Location Call # Status
Joyner - Fed Docs Stacks Y 4.SCI 2:101/18 ✔ Available
Cover image for DES modes of operation

DES modes of operation

Location Call # Status
Joyner - Microforms B300 C 13.52:81 ✔ Available
Cover image for Computer Security Act of 1987

Computer Security Act of 1987

Location Call # Status
Joyner - Fed Docs Stacks Y 4.SCI 2:102/M ✔ Available