-
3
-
-
85055235506
-
Protect Your Boss and Your Job: Due Care in Information Security
-
San Francisco, May
-
Bryson, Lisa C. Protect Your Boss and Your Job: Due Care in Information Security. Computer Security Alert 146, San Francisco, May 1995.
-
(1995)
Computer Security Alert
, vol.146
-
-
Bryson, L.C.1
-
9
-
-
0005759267
-
-
2nd ed. New York: Oxford University Press
-
Ermann, M. David, Mary B. Williams, and Michele S. Shauf. Computers, Ethics and Society, 2nd ed. New York: Oxford University Press, 1997.
-
(1997)
Computers, Ethics and Society
-
-
Ermann, M.D.1
Williams, M.B.2
Shauf, M.S.3
-
13
-
-
85055231888
-
CISSP Certified CBK Study Guide: Business Continuity Planning Domain
-
Hare, Chris. CISSP Certified CBK Study Guide: Business Continuity Planning Domain. Posted at http://www.cccure.org, March 1999.
-
(1999)
Posted at Http://Www.Cccure.Org, March
-
-
Chris, H.1
-
14
-
-
0003900673
-
-
January
-
Housley, R., W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, SPYRUS, January 1999.
-
(1999)
Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, SPYRUS
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
23
-
-
85055219772
-
-
McGraw-Hill
-
King, Christopher M., Curtis E. Dalton, and T. Ertem Osmanoglu. Security Architecture: Design, Deployment and Operations. Emeryville, CA: Osborn/McGraw-Hill, 2001.
-
(2001)
Dalton, and T. Ertem Osmanoglu. Security Architecture: Design, Deployment and Operations. Emeryville, CA: Osborn
-
-
King, C.M.1
Curtis, E.2
-
32
-
-
0034430573
-
Risk Reduction Out, Enablement and Due Care
-
Volume, Number
-
Parker, Donn. Risk Reduction Out, Enablement and Due Care In. Computer Security Institute Journal, Volume XVI, Number 4, Winter 2000.
-
(2000)
Computer Security Institute Journal
, vol.16
, Issue.4
-
-
Parker, D.1
-
35
-
-
0033698868
-
How to Build a Comprehensive Security Awareness Program
-
Volume, Number
-
Peltier, Tom. How to Build a Comprehensive Security Awareness Program. Computer Security Institute Journal, Volume XVI, Number 2, Spring 2000.
-
(2000)
Computer Security Institute Journal
, vol.16
, Issue.2
-
-
Peltier, T.1
-
36
-
-
0004198635
-
-
2nd ed. Upper Saddle River, NJ: Prentice Hall
-
Pfleeger, Charles P. Security in Computing, 2nd ed. Upper Saddle River, NJ: Prentice Hall, 1996.
-
(1996)
Security in Computing
-
-
Pfleeger, C.P.1
-
47
-
-
0346779433
-
-
Washington, D.C.: U.S. Government Printing Office
-
U.S. Department of Defense. Technical Rationale behind CSC-STD-003-85. Washington, D.C.: U.S. Government Printing Office, 1985.
-
(1985)
Technical Rationale behind CSC-STD-003-85
-
-
-
48
-
-
0003969633
-
-
Washington, D.C.: U.S. Government Printing Office
-
U.S. Department of Defense. Trusted Computer System Evaluation Criteria. Washington, D.C.: U.S. Government Printing Office, 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
50
-
-
18844385959
-
-
Vol., Schaumburg, IL: SRV Professional Publications
-
Vallabhaneni, Rao S. CISSP Examination Textbooks, Vol. 1. Schaumburg, IL: SRV Professional Publications, 2000.
-
(2000)
CISSP Examination Textbooks
, vol.1
-
-
Vallabhaneni, R.S.1
|