Computers
IMPLEMENTING RANDOM ASSIGNMENT - A COMPUTER-BASED APPROACH IN A FIELD EXPERIMENTAL SETTING
NCJ Number
60341
Journal
EVALUATION QUARTERLY
Date Published
1979
COMPUTER SIMULATION OF ADULT SENTENCING PROPOSALS
NCJ Number
55955
Journal
Evaluation and Program Planning
Date Published
1978
MAN WITH MACHINE SUPPORTS INVESTIGATOR (FROM CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES, PROCEEDINGS, 1976, BY JOHN S JACKSON - SEE NCJ-57707)
NCJ Number
57717
Date Published
1976
PLAN FOR COMPUTER PROTECTION
NCJ Number
57891
Journal
Security Industry and Product News
Date Published
1979
COMPUTER IDENTIFICATION OF BULLETS (FROM CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES - PROCEEDINGS, 1977, BY JOHN JACKSON - SEE NCJ-57737)
NCJ Number
57755
Date Published
1977
IDENTIFICATION TECHNOLOGIES - COMPUTER, OPTICAL, AND CHEMICAL AIDS TO PERSONAL ID
NCJ Number
60835
Date Published
1979
WILL THE POLICE EVER UNDERSTAND MODERN TECHNOLOGY?
NCJ Number
59674
Journal
Police Magazine
Date Published
1979
COMPUTER CRIMINALITY AND CRIMINAL LAW
NCJ Number
54886
Date Published
1977
DATA-INDEPENDENT INFORMATION RETRIEVAL SYSTEM - A SOLUTION FOR THE SMALL LABORATORY'S COMPUTER NEEDS
NCJ Number
57033
Journal
Journal of Forensic Sciences
Date Published
1979
MODEL OF A PROTECTED DATA MANAGEMENT SYSTEM
NCJ Number
57598
Date Published
1976
PRIVACY - HOW TO PROTECT WHAT'S LEFT OF IT
NCJ Number
54201
Date Published
1979
VULNERABILITY OF COMPUTER AUDITING - TECHNICAL REPORT
NCJ Number
57838
Date Published
1977
PROTECTION OF INFORMATION IN COMPUTER SYSTEMS
NCJ Number
55298
Journal
PROCEEDINGS OF THE IEEE
Date Published
1975
OPTIMIZATION OF A COMPUTER SECURITY INDEX VERSUS COST
NCJ Number
57597
Date Published
1978
EYE ON THE FUTURE
NCJ Number
54784
Journal
Police Review
Date Published
1978
COMPUTER FRAUD AND ABUSE
NCJ Number
55165
Journal
COMPUTER JOURNAL
Date Published
1978