Threat assessment
Data Security and Data Processing, Volume 5 - Study Results TRW (Thompson Ramo Wooldridge, Inc) Systems
NCJ Number
89655
Date Published
1974
Threats and Vulnerabilities in a Computer System (From Data Security and Data Processing, Volume 5, P 25-73, 1974 - See NCJ-89655)
NCJ Number
89657
Date Published
1982
Requirements for Secure Operating Systems (From Data Security and Data Processing, Volume 5, P 75-205, 1974 - See NCJ-89655)
NCJ Number
89658
Date Published
1982
Offshore Energy Terrorism - Perspectives on a Problem
NCJ Number
90388
Journal
Terrorism
Date Published
1983
Commercial Security Field Test - St Louis, Missouri
NCJ Number
84961
Date Published
Unknown
Political Terrorism - Theory, Tactics, and Counter-Measures
NCJ Number
88961
Date Published
1982
US Government Response to Terrorism - In Search of an Effective Strategy
NCJ Number
87513
Date Published
1982
Terrorism - Past, Present, Future
NCJ Number
86997
Date Published
1982
International Terrorism - How Nations Respond to Terrorists
NCJ Number
86272
Date Published
1982
Responding to the Terrorist Threat - Security and Crisis Management
NCJ Number
86019
Date Published
1980
European Terrorism - A German Perspective
NCJ Number
86085
Journal
Terrorism
Date Published
1982
Corporate Security Takes Off
NCJ Number
85405
Journal
Security Management
Date Published
1982
Security Litigations and Related Matters
NCJ Number
85313
Date Published
1982
Executive Protection
NCJ Number
85122
Journal
Journal of Security Administration
Date Published
1982
War Against Terrorism
NCJ Number
85273
Date Published
1982