Search Results
You searched for:
subject
"Electronic data processing departments+Security measures.+Standards."
Remove constraint
Showing 1 - 10 of 10 results
Search Results
Escrowed Encryption Standard (EES).
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.52:185 | ✔ Available |
Guidelines on evaluation of techniques for automated personal identification
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.52:48 | ✔ Available |
Computer Security Act of 1987
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/7:C 73/29 | ✔ Available |
Military and civilian control of computer security issues
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/7:M 59/17 | ✔ Available |
Guideline on user authentication techniques for computer network access control
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | C 13.52:83 | ✔ Available |
Computer Security Research and Training Act of 1985
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.G 74/7:C 73/26/985 | ✔ Available |
Standards for security and privacy of criminal justice information
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | HV7936.I5 S785 1975 | ✔ Available |