Security
Data Security and Data Processing, Volume 1 - Introduction and Overview
NCJ Number
89626
Date Published
Unknown
Data Security and Data Processing, Volume 2 - Study Summary
NCJ Number
89627
Date Published
1974
Data Security and Data Processing, Volume 3, Part 2 - Study Results - State of Illinois
NCJ Number
89629
Date Published
1974
Data Security and Data Processing, Volume 4 - Study Results - Massachusetts Institute of Technology
NCJ Number
89630
Date Published
1974
Modern Retail Risk Management - The Manual of Security and Loss Prevention for Retailers and Traders
NCJ Number
90001
Date Published
1981
Issues of Secure Computer System Certification (From Data Security and Data Processing, Volume 5, P 207-255, 1974 - See NCJ-89655)
NCJ Number
89659
Date Published
1982
Study of Automated Aids for Secure Systems (From Data Security and Data Processing, Volume 5, P 257-317, 1974 - See NCJ-89655)
NCJ Number
89660
Date Published
1982
State of Practice of Computer Security (From Data Security and Data Processing, Volume 4, P 163-178, 1974 - See NCJ-89630)
NCJ Number
89631
Date Published
1974
Computer System Security Technology (From Data Security and Data Processing, Volume 5, P 5-23, 1974 - See NCJ-89655)
NCJ Number
89656
Date Published
1974
Requirements for Secure Operating Systems (From Data Security and Data Processing, Volume 5, P 75-205, 1974 - See NCJ-89655)
NCJ Number
89658
Date Published
1982
Model Burglary Security Code - Minimum Standards
NCJ Number
83103
Date Published
Unknown
Achieving Security Awareness - Tips and Techniques
NCJ Number
89497
Journal
Computer Security Journal
Date Published
1983
Computer Security Standards for Government and Industry - Where Will They Come From?
NCJ Number
89498
Journal
Computer Security Journal
Date Published
1983
Structured Approach to Computer Security (From Computer Security, P 181-196, 1981 - See NCJ-88617)
NCJ Number
88619
Date Published
1981
Complete Security Handbook
NCJ Number
88918
Date Published
1983
Contingency Planning (From Computer Systems Security, P 295-306, 1981 - See NCJ-88617)
NCJ Number
88627
Date Published
1981
Software Controls (From Computer Systems Security, P 231-242, 1981 - See NCJ-88617)
NCJ Number
88622
Date Published
1981
What If the Thief Is a Loyal Employee?
NCJ Number
89310
Journal
Security Management
Date Published
1983
Carrying out a Computer Security Audit (From Computer Systems Security, P 307-327, 1981 - See NCJ-88617)
NCJ Number
88628
Date Published
1981
Future of Data Security - Thoughts and Proposals
NCJ Number
89499
Journal
Computer Security Journal
Date Published
1983