Computers -- United States -- Access controlSee also what's at your library, or elsewhere.
Broader terms:Related term: |
Filed under: Computers -- United States -- Access control
Items below (if any) are from related and broader terms.
Filed under: Computers -- Access control -- United States- Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
Filed under: Computers -- United States
Filed under: Computer security -- United States- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
- Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
- A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
Filed under: Data encryption (Computer science) -- United States- Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
Filed under: Data encryption (Computer science) -- Law and legislation -- United StatesFiled under: Computer security -- Government policy -- United States
Filed under: Electronic data processing -- United States -- Security measuresFiled under: Data protection -- United States- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- What the Government Does With Americans' Data (New York: Brennan Center for Justice, c2013), by Rachel Levinson-Waldman (PDF with commentary at brennancenter.org)
- Investigation of Competition in Digital Markets: Majority Staff Report and Recommendations (2020), by United States House Committee on the Judiciary (PDF at fdlp.gov)
- A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
Filed under: Data protection -- Law and legislation -- United States- Patient's Guide to HIPAA: How to Use the Law to Guard Your Health Privacy (version 2.0; Lake Oswego, OR: World Privacy Forum, c2019), by Robert Gellman, contrib. by Pam Dixon (HTML with commentary at worldprivacyforum.org)
- Liberty and Security in a Changing World: Report and Recommendations of the President's Review Group on Intelligence and Communications Technologies (2013), by United States President's Review Group on Intelligence and Communications Technologies, contrib. by Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter P. Swire (PDF with commentary at whitehouse.gov)
Filed under: Computers -- Social aspects -- United States
Filed under: Computers -- Social aspects -- California -- San FranciscoFiled under: Computers -- Study and teaching -- United States
Filed under: Computers -- Access control- Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
Filed under: Computers -- Access control -- AsiaFiled under: Computers -- Access control -- Handbooks, manuals, etc.Filed under: Computers -- Access control -- Periodicals |