Listing 1 - 5 of 5 |
Sort by
|
Choose an application
The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is the
681.3*K6M --- Electronic data processing departments --- -Computer centers --- Management of computing and information systems: economics --- Security measures --- -Management of computing and information systems: economics --- 681.3*K6M Management of computing and information systems: economics --- -681.3*K6M Management of computing and information systems: economics --- Computer centers --- Computer department security measures --- Data protection --- Security measures.
Choose an application
Audit --- Computer. Automation --- 681.3*K6M --- Computer crimes --- Computer security --- Electronic data processing departments --- -Fraud --- Commercial fraud --- Deceit --- Misrepresentation (Crime) --- Commercial crimes --- Deception --- Torts --- Hoaxes --- Impostors and imposture --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Management of computing and information systems: economics --- Security measures --- 681.3*K6M Management of computing and information systems: economics --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Fraud --- Computer department security measures --- Computer security.
Choose an application
Computer architecture. Operating systems --- Electronic data processing departments --- Computer security --- Security measures --- 681.3*K6M --- -Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Management of computing and information systems: economics --- -Management of computing and information systems: economics --- 681.3*K6M Management of computing and information systems: economics --- -Computer privacy --- Cyber security --- Cybersecurity --- Computer centers --- Protection of computer systems --- Protection --- Computer department security measures --- Computer security. --- Electronic data processing departments - Security measures
Choose an application
Computers --- Electronic data processing departments --- Ordinateurs --- Informatique, Centres d' --- Access control --- Congresses --- Security measures --- Accès --- Contrôle --- Congrès --- Sûreté --- Mesures --- Computer security --- -Electronic data processing departments --- -681.3*C20 --- 681.3*D46 --- 681.3*H20 --- 681.3*K6m --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*H20 --- Insurance; security (Management of computing and information systems) --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3*C20 --- Security measures&delete& --- 6813*C20 --- Computer security - Congresses --- Electronic data processing departments - Security measures - Congresses
Choose an application
Computer. Automation --- Electronic data processing departments --- Privacy, Right of --- Informatique, Centres d' --- Droit à la vie privée --- Security measures --- Sûreté --- Mesures --- AA / International- internationaal --- 654 --- -338.043 --- #TCPW P4.0 --- #TCPW P4.8 --- 681.3*D46 --- 681.3*K41 --- 681.3*K62 --- 681.3*K6m --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Computer centers --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K41 --- Installation management: benchmarks; computer selection; pricing and resourceallocation; computing equipment management; performance and usage measurement(Management of computing and information systems) --- Insurance; security (Management of computing and information systems) --- Law and legislation --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*K62 Installation management: benchmarks; computer selection; pricing and resourceallocation; computing equipment management; performance and usage measurement(Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Droit à la vie privée --- Sûreté --- 338.043 --- Computer department security measures --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- Electronic data processing departments - Security measures
Listing 1 - 5 of 5 |
Sort by
|