14th National Computer Security Conference

14th National Computer Security Conference
Author :
Publisher :
Total Pages : 762
Release :
ISBN-10 : CORNELL:31924056630498
ISBN-13 :
Rating : 4/5 (98 Downloads)

Book Synopsis 14th National Computer Security Conference by :

Download or read book 14th National Computer Security Conference written by and published by . This book was released on 1991 with total page 762 pages. Available in PDF, EPUB and Kindle. Book excerpt:


14th National Computer Security Conference Related Books

14th National Computer Security Conference
Language: en
Pages: 762
Authors:
Categories: Computer security
Type: BOOK - Published: 1991 - Publisher:

DOWNLOAD EBOOK

National Computer Security Conference Proceedings, 1992
Language: en
Pages: 416
Authors: DIANE Publishing Company
Categories: Computers
Type: BOOK - Published: 1992-11 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation.
National Computer Security Conference, 1993 (16th) Proceedings
Language: en
Pages: 568
Authors: DIANE Publishing Company
Categories: Business & Economics
Type: BOOK - Published: 1995-08 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activiti
Computer System and Network Security
Language: en
Pages: 338
Authors: Gregory B. White
Categories: Computers
Type: BOOK - Published: 2017-12-14 - Publisher: CRC Press

DOWNLOAD EBOOK

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Int
Secure Computers and Networks
Language: en
Pages: 390
Authors: Eric A. Fisch
Categories: Computers
Type: BOOK - Published: 1999-12-28 - Publisher: CRC Press

DOWNLOAD EBOOK

This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier