Hidden fields
Books Books
" Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on collecting, quantifying, and analyzing data related to the frequency of caused by adverse events. This guideline describes the characteristics... "
Implementation of the Computer Security Act: Hearing Before the Subcommittee ... - Page 47
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1989 - 148 pages
Full view - About this book

Computer Security in the Federal Government and the Private Sector: Hearings ...

United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management - 1983 - 520 pages
...GUIDELINE FOR AUTOMATIC DATA PROCESSING RISK ANALYSIS ' FIPS-PUB-65 August 1979 Order fron NTIS $7.50 Presents a technique for conducting a risk analysis...and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATION FIPS-PUB-73 June 1980 Order from NTIS $9.00 Describes...
Full view - About this book

Computer Security in the Federal Government and the Private Sector: Hearings ...

United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management - 1983 - 528 pages
...1979 FIPS-PUB-65 Order from NTIS $7.50 Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on...and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS FIPS-PUB-73 June 1980 Order from NTIS $9.00 Describes...
Full view - About this book

Computer security in the federal government and the private sector ..., Volume 4

United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management - 1983 - 530 pages
...GUIDELINE FOR AUTOMATIC DATA PROCESSING RISK ANALYSIS August 1979 FIPS-PUB-65 Order from NTIS $7.50 Presents a technique for conducting a risk analysis...attributes of a computer system that must be known far a risk analysis and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER...
Full view - About this book

A Five-year Plan, Meeting the Automatic Data Processing and ..., Volume 1

1986 - 376 pages
...PROCESSING RISK ANALYSIS FIPS 65 August 1979 Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on...quantifying, and analyzing data related to the frequency of losses caused by adverse events. This guideline describes the characteristics and attributes of a computer...
Full view - About this book

Computer and Communications Security and Privacy: Hearings Before the ...

United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation, Aviation, and Materials - 1984 - 562 pages
...FIPS-PUB-65 August 1979 Order from NTIS $7.50 Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on...and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS FIPS-PUB-73 June 1980 Order from NTIS $9.00 Describes...
Full view - About this book

Computer Crime and Computer Security: Hearing Before the ..., Volume 4

United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime - 1986 - 248 pages
...GUIDELINE FOB AUTOMATIC DATA PROCESSING RISK ANALYSTS' FIPS-PUB-65 August 1979 Order from NTIS J8.50 Presents a technique for conducting a risk analysis...and gives an example of the risk analysis process. GUIDELINES FOR SECURITY OF COMPUTER APPLICATIONS' FIPS-PUB-73 Order from NTIS June 1980 S10.00 Describes...
Full view - About this book

Military and Civilian Control of Computer Security Issues: Hearing ..., Volume 4

United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1989 - 338 pages
...PROCESSING RISK ANALYSIS August 1979 Presents a technique for conducting a risk analysis of an ADP facility and related assets. Provides guidance on...describes the characteristics and attributes of a computer syste* that oust be known for a risk analysis and gives an example of the risk analysis process. FIPS...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF