Search Results
You searched for:
subject
"Electronic data processing+Security measures.+United States."
Remove constraint
Showing 1 - 10 of 63 results
Search Results
Computer security in the federal government
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.C 73.7:S.HRG.105-1068 | ✔ Available |
Computer security in the federal government and the private sector
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/9:S.HRG.98-440 | ✔ Available |
Implementation of the Computer Security Act
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.SCI 2:100/146 | ✔ Available |
Guidelines for security of computer applications
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.52:73 | ✔ Available |
Users' guide to computer crime: its commission, detection & prevention
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | HF5548.2 .L393 1974 | ✔ Available |
Implementation of the Computer Security Act
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.SCI 2:101/18 | ✔ Available |
Computer Security Act of 1987
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.SCI 2:102/M | ✔ Available |