Hidden fields
Books Books
" ... along with their reporting instructions. The agencies' headquarters consolidated the information they received and prepared an agency response. "
Computer Security: Identification of Sensitive Systems Operated on Behalf of ... - Page 2
by United States. General Accounting Office - 1989 - 20 pages
Full view - About this book

Implementation of the Computer Security Act: Hearing Before the ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1989 - 166 pages
...headquarters consolidated the information they received and prepared an agency response. Some agencies used computer security plans, inventories, or other documentation as a check to ensure the lists submitted to the Committees were complete. Concerns Expressed By Agencies Officials of three...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF