Search Results - "Computer Systems Management and Standards."
-
1
-
2
-
3
Information Security: Computer Hacker Information Available on the Internet.
Published 05 JUN 1996Book -
4
-
5
A proposed modeling protocol for evaluating information attacks / John H. Brand II.
Published January 1999Book -
6
Major ADP Systems. DoD Does Not Always Comply With Statutory Restriction on Obligations.
Published 07 JAN 1991Book -
7
Information Security: Serious and Widespread Weaknesses Persist at Federal Agencies.
Published SEP 2000Book -
8
-
9
-
10
-
11
Information Security: Weaknesses Place Commerce Data and Operations at Serious Risk.
Published AUG 2001Book -
12
-
13
Year 2000 Computing Crisis: Actions Needed to Address Credit Union Systems' Year 2000 Problem.
Published JAN 1998Book -
14
INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets.
Published 23 SEP 1998Book -
15
-
16
-
17
VA INFORMATION TECHNOLOGY: Important Initiatives Begun, Yet Serious Vulnerabilities Persist.
Published 04 APR 2001Book -
18
-
19
-
20
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.
Published 01 APR 2005Book