Defending Secrets, Sharing Data

Defending Secrets, Sharing Data
Author :
Publisher :
Total Pages : 196
Release :
ISBN-10 : UCR:31210011004338
ISBN-13 :
Rating : 4/5 (38 Downloads)

Synopsis Defending Secrets, Sharing Data by :

Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.

Catalog

Catalog
Author :
Publisher :
Total Pages : 72
Release :
ISBN-10 : OSU:32437010694343
ISBN-13 :
Rating : 4/5 (43 Downloads)

Synopsis Catalog by : United States. Congress. Office of Technology Assessment

Federal Government

Federal Government
Author :
Publisher :
Total Pages : 14
Release :
ISBN-10 : UFL:31262047280846
ISBN-13 :
Rating : 4/5 (46 Downloads)

Synopsis Federal Government by : United States. Superintendent of Documents

Accessibility and Integrity of Networked Information Collections

Accessibility and Integrity of Networked Information Collections
Author :
Publisher : Washington, D.C. : Congress of the United States, Office of Technology Assessment
Total Pages : 138
Release :
ISBN-10 : STANFORD:36105016442076
ISBN-13 :
Rating : 4/5 (76 Downloads)

Synopsis Accessibility and Integrity of Networked Information Collections by : United States. Congress. Office of Technology Assessment

CIO

CIO
Author :
Publisher :
Total Pages : 100
Release :
ISBN-10 :
ISBN-13 :
Rating : 4/5 ( Downloads)

Synopsis CIO by :

CIO magazine, launched in 1987, provides business technology leaders with award-winning analysis and insight on information technology trends and a keen understanding of IT’s role in achieving business goals.

An Introduction to Computer Security

An Introduction to Computer Security
Author :
Publisher : DIANE Publishing
Total Pages : 289
Release :
ISBN-10 : 9780788128301
ISBN-13 : 0788128302
Rating : 4/5 (01 Downloads)

Synopsis An Introduction to Computer Security by : Barbara Guttman

Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.