Electronic data processing departments -- Security measuresSee also what's at your library, or elsewhere.
Broader terms:Used for:- Computer department security measures
|
Filed under: Electronic data processing departments -- Security measures Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov) Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil) Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org)
Items below (if any) are from related and broader terms.
Filed under: Data processing service centers -- Energy conservation Greening IT: How a Greening IT Can Form a Solid Base for a Low-Carbon Society (c2009), ed. by Adrian T. Sobotta, Irene N. Sobotta, and John Gøtze
Filed under: Data protection
Filed under: Data protection -- Australia
Filed under: Data protection -- CostsFiled under: Data protection -- Government policy Global Survey on Internet Privacy and Freedom of Expression (in English, French, and Arabic; Paris: UNESCO, 2012), by Toby Mendel, Andrew Puddephatt, Ben Wagner, Dixie Hawtin, and Natalia Torres (PDF with commentary at unesco.org) Good Data (Theory on Demand #29; Amsterdam: Institute for Network Cultures, 2019), ed. by Angela Daly, S. Kate Devitt, and Monique Mann (multiple formats with commentary at networkcultures.org) Filed under: Data protection -- Law and legislationFiled under: Data protection -- Moral and ethical aspectsFiled under: Data protection -- New ZealandFiled under: Data protection -- United States Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) What the Government Does With Americans' Data (New York: Brennan Center for Justice, c2013), by Rachel Levinson-Waldman (PDF with commentary at brennancenter.org) Investigation of Competition in Digital Markets: Majority Staff Report and Recommendations (2020), by United States House Committee on the Judiciary (PDF at fdlp.gov) A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary Filed under: Computer security Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net) The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink) UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink) Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
Filed under: Aeronautics, Commercial -- Security measures Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust) Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Air bases, American -- Security measures Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Filed under: Airports -- Security measures Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust) Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust) Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Command and control systems -- United States -- Security measuresMore items available under broader and related terms at left. |