Searching Books & More : "Computer security"

Data processing X
90 results found in Books & More
RSS
Cover images provided by Open Library

Information systems the status of computer security at the Department of Veterans Affairs : report to the Secretary of Veterans Affairs

Published: Washington, D.C. (P.O. Box 37050, Washington 20013) : The Office, [1999]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Framework for Emergency Response official (ERO) authentication and authorization infrastructure

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide for developing security plans for information technology systems

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Financial markets computer security controls at five stock exchanges need strengthening : report to the Chairman, Securities and Exchange Commission

Published: Washington, D.C. : The Office ; Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) : The Office [distributor, 1991]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Risk management guide for information technology systems recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, Md. : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2002
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Information security computer controls over key Treasury internet payment system : report to congressional requesters

Published: Washington, D.C. : U.S. General Accounting Office, [2003]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Elliptic curves in cryptography

Published: New York : Cambridge University Press, 1999
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Enterprise security architecture using IBM Tivoli security solutions

Published: [United States?] : IBM, International Technical Support Organization, 2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The new school of information security

Published: Upper Saddle River, NJ : Addison Wesley Professional, c2008
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

The new school of information security

Published: Upper Saddle River, [N.J.] : Addison-Wesley, c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Digital Signature Standard (DSS)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, Information Technology Laboratory, National Institute of Standards and Technology, [2000]
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Electronic postage systems technology, security, economics

Published: New York : Springer, c2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Enterprise security : a data-centric approach to securing the enterprise

Published: Birmingham, UK : Packt Publishing, February 2013
©2013
Format: Electronic Resource, Remote
Retrieving Holdings Information