Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 436
Book Description
Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 436
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 436
Book Description
NBS Special Publication
Author:
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 764
Book Description
Publisher:
ISBN:
Category : Weights and measures
Languages : en
Pages : 764
Book Description
Data Security and Data Processing: Study results: Massachusetts Institute of Technology
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 308
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 308
Book Description
Data Security and Data Processing: Study summary
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
Data Security and Data Processing: Study results: TRW Systems, inc
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 328
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 328
Book Description
Federal Information Processing Standards Publication
Author:
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 78
Book Description
Publisher:
ISBN:
Category : Electronic data processing
Languages : en
Pages : 78
Book Description
Computer Security
Author: David K. Hsiao
Publisher: Academic Press
ISBN: 1483218376
Category : Business & Economics
Languages : en
Pages : 318
Book Description
Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.
Publisher: Academic Press
ISBN: 1483218376
Category : Business & Economics
Languages : en
Pages : 318
Book Description
Computer Security provides information pertinent to the growing concern with computer security and privacy, extending beyond the conventional military requirement to cover the entire civilian and business community. This book discusses the approaches to ensure the integrity of stored data. Organized into eight chapters, this book begins with an overview of the relationships between privacy issues and security measures. This text then provides a discussion on privacy issues, legislative measures, and their implications on security. Other chapters consider the technical implications of the enactment of privacy legislation and explain the control of access required by the privacy legislation. This book discusses as well the internal policies and procedures of operational security, which is adopted by management to ensure the security of their data and computer installation. The final chapter deals with optimizing database management system to facilitate the use of data effectively and efficiently. This book is a valuable resource for technical managers.
Data Security and Data Processing: Evaluations and installation experiences: Resource Security System
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 132
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 132
Book Description
The Use of Passwords for Controlled Access to Computer Resources
Author: Helen M. Wood
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 64
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 64
Book Description
Data Security and Data Processing
Author: International Business Machines Corporation
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 900
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 900
Book Description