Hidden fields
Books Books
" (3) have responsibility within the Federal Government for developing technical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive information in Federal computer systems... "
Implementation of the Computer Security Act: Hearing Before the Subcommittee ... - Page 59
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1989 - 148 pages
Full view - About this book

United States Code, Volume 1; Volume 3

United States - 1994 - 1332 pages
...Technology shall be responsible for developing and proposing standards and guidelines needed to assure ߁ 9 Լڂ Լڂ X Y Z 1 So In original. Probably should be a semicolon. (c) Study of impact of Federal procurement regulations...
Full view - About this book

Summary of Activities of the Committee on Science and ..., Volumes 2-10

United States. Congress. House. Committee on Science and Technology - 1988 - 172 pages
...3502(2) of title 44, United States Code; "(3) have responsibility within the Federal Government for developing technical, management, physical, and administrative...sensitive information in Federal computer systems except— "(A) those systems excluded by section 2315 of title 10, United States Code, or section 3502(2)...
Full view - About this book

Compilation of Intelligence Laws and Related Laws and Executive Orders of ...

United States - 1990 - 698 pages
...3502(2) of title 44, United States Code; "(3) have responsibility within the Federal Government for developing technical, management, physical, and administrative...sensitive information in Federal computer systems except — "(A) those systems excluded by section 2315 of title 10, United States Code, or section...
Full view - About this book

Computer Security Act of 1987: Hearings Before a Subcommittee of the ...

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1987 - 728 pages
...promulgate standards and guidelines for federal computer systems, including those "needed to assure the cost-effective security and privacy of sensitive information in Federal computer systems." HR 145, Section 2 (b) . The prospect of another level of government bureaucracy dealing with the conditions...
Full view - About this book

Information Systems: Agencies Overlook Security Controls During Development ...

United States. General Accounting Office - 1988 - 58 pages
...Standards responsibility for developing and promulgating standards and guidelines needed to assure the cost-effective security and privacy of sensitive information in federal computer systems, drawing on the technical advice and assistance of the National Security Agency where appropriate.2...
Full view - About this book

Military and Civilian Control of Computer Security Issues: Hearing ..., Volume 4

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1989 - 338 pages
...within the Federal Government for: a. Developing technical, management, physical, and adainistrative standards and guidelines for the cost-effective security...Federal computer systems as defined in the Act; and. b. Drawing on the computer system technical security guidelines of the National Security Agency (NSA)...
Full view - About this book

Summary of Activities of the Committee on Science, Space, and Technology ...

United States. Congress. House. Committee on Science, Space, and Technology - 1989 - 388 pages
...3502(2) of title 44, United States Code; "(3) have responsibility within the Federal Government for developing technical, management, physical, and administrative...sensitive information in Federal computer systems except — "(A) those systems excluded by section 2315 of title 10, United States Code, or section...
Full view - About this book

Congressional Serial Set

1990 - 1662 pages
...methods and techniques for computer systems; "(3) have responsibility within, the Federal Government for developing technical, management, physical, and administrative...sensitive information in Federal computer systems except— "(A) those systems excluded by section 2315 of title 10, United States Code, or section 3502(2)...
Full view - About this book

Guide to Software Acceptance

Dolores R. Wallace, John C. Cherniavsky - 1993 - 48 pages
...utilization of Federal information technology resources. NCSL's responsibilities include development of technical, management, physical, and administrative...the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. NCSL assists agencies in developing security...
Full view - About this book

Implementation of the Computer Security Act (Public Law 100-235 ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1990 - 188 pages
...sensitive information; (2) Development of computer security standards and guidelines needed to assure the cost-effective security and privacy of sensitive information in Federal computer systems; and (3) Provision of computer security assistance and support to federal agencies operating computer...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF