Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 464
Book Description
NBS Special Publication
Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 464
Book Description
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 464
Book Description
Data Security and Data Processing: Study summary
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
The Use of Passwords for Controlled Access to Computer Resources
Author: Helen M. Wood
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 64
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 64
Book Description
Computer Security
Author: John S. Potts
Publisher: Nova Publishers
ISBN: 9781590335215
Category : Computers
Languages : en
Pages : 158
Book Description
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Publisher: Nova Publishers
ISBN: 9781590335215
Category : Computers
Languages : en
Pages : 158
Book Description
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Computer Security
Author: David K. Hsiao
Publisher: Academic Press
ISBN: 1483218376
Category : Business & Economics
Languages : en
Pages : 318
Book Description
Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.
Publisher: Academic Press
ISBN: 1483218376
Category : Business & Economics
Languages : en
Pages : 318
Book Description
Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.
Information Resources Management Plan of the Federal Government
Author:
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 264
Book Description
Publisher:
ISBN:
Category : Administrative agencies
Languages : en
Pages : 264
Book Description
Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 436
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 436
Book Description
Federal Information Dissemination Policies and Practices
Author: United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee
Publisher:
ISBN:
Category : Depository libraries
Languages : en
Pages : 914
Book Description
Publisher:
ISBN:
Category : Depository libraries
Languages : en
Pages : 914
Book Description
Federal Information Processing Standards Publication
Author:
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 78
Book Description
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 78
Book Description
Federal Program Evaluations
Author:
Publisher:
ISBN:
Category : Evaluation research (Social action programs)
Languages : en
Pages : 1032
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.
Publisher:
ISBN:
Category : Evaluation research (Social action programs)
Languages : en
Pages : 1032
Book Description
Contains an inventory of evaluation reports produced by and for selected Federal agencies, including GAO evaluation reports that relate to the programs of those agencies.