Security procedures for computer systems /
| Main Author: | Hemphill, Charles F. |
|---|---|
| Other Authors: | Hemphill, John M. (John Mark), 1946- |
| Format: | Book |
| Language: | English |
| Published: |
Homewood, Ill. :
Dow Jones-Irwin,
1973.
|
| Subjects: |
Similar Items
Security safeguards for the computer /
by: Hemphill, Charles F.
Published: (1979)
by: Hemphill, Charles F.
Published: (1979)
Computer data security /
by: Katzan, Harry
Published: (1973)
by: Katzan, Harry
Published: (1973)
Security, accuracy, and privacy in computer systems.
by: Martin, James, 1933-2013
Published: (1973)
by: Martin, James, 1933-2013
Published: (1973)
Computer security : a management guide /
Published: (1978)
Published: (1978)
Where next for computer security? : a report of the National Study Group on the Security of Computer-based Systems /
Published: (1974)
Published: (1974)
Computer security handbook /
Published: (1973)
Published: (1973)
Computer security handbook.
Published: (2009)
Published: (2009)
Computer security handbook /
Published: (2002)
Published: (2002)
Computer Security Handbook.
Published: (2012)
Published: (2012)
Computer security : a management audit approach /
by: Enger, Norman L.
Published: (1980)
by: Enger, Norman L.
Published: (1980)
Security and privacy in computer systems /
by: Hoffman, Lance J.
Published: (1973)
by: Hoffman, Lance J.
Published: (1973)
Management handbook of computer security /
by: Waring, L. P. (Leslie Philip)
Published: (1978)
by: Waring, L. P. (Leslie Philip)
Published: (1978)
SAFE: security audit and field evaluation for computer facilities and information systems /
by: Krauss, Leonard I.
Published: (1972)
by: Krauss, Leonard I.
Published: (1972)
Security, checklist for computer center self-audits.
by: Browne, Peter
Published: (1979)
by: Browne, Peter
Published: (1979)
Security in on-line systems /
by: Pritchard, J. A. T. (John A. T.)
Published: (1979)
by: Pritchard, J. A. T. (John A. T.)
Published: (1979)
Computer control and security : a guide for managers and systems analysts /
by: Perry, William E.
Published: (1981)
by: Perry, William E.
Published: (1981)
The Data Processing security game : safeguarding against the real dangers of computer abuse /
by: Becker, Robert S., 1932-
Published: (1977)
by: Becker, Robert S., 1932-
Published: (1977)
Computer security : a handbook for management /
by: Fine, Leonard H.
Published: (1983)
by: Fine, Leonard H.
Published: (1983)
Management strategies for computer security /
by: Perry, William E.
Published: (1985)
by: Perry, William E.
Published: (1985)
Management guide to computer security /
by: Talbot, J. R. (John R.)
Published: (1981)
by: Talbot, J. R. (John R.)
Published: (1981)
Security standards for data processing /
by: Wooldridge, Susan, 1940-
Published: (1973)
by: Wooldridge, Susan, 1940-
Published: (1973)
Computer security /
by: Carroll, John M., 1925-
Published: (1987)
by: Carroll, John M., 1925-
Published: (1987)
Computer security /
by: Carroll, John M., 1925-
Published: (1977)
by: Carroll, John M., 1925-
Published: (1977)
SAFE : security audit and field evaluation for computer facilities and information systems /
by: Krauss, Leonard I.
Published: (1980)
by: Krauss, Leonard I.
Published: (1980)
Information systems security /
by: Fisher, Royal P., 1932-
Published: (1984)
by: Fisher, Royal P., 1932-
Published: (1984)
Information security for managers /
by: Caelli, William
Published: (1989)
by: Caelli, William
Published: (1989)
Protecting your microcomputer system /
by: Highland, Harold Joseph
Published: (1984)
by: Highland, Harold Joseph
Published: (1984)
Security and control in information systems : a guide for business and accounting /
by: Hawker, Andrew
Published: (2000)
by: Hawker, Andrew
Published: (2000)
How to test internal control and integrity in computerized systems /
by: Perry, William E.
Published: (1980)
by: Perry, William E.
Published: (1980)
Computer security handbook /
Published: (2002)
Published: (2002)
Viruses, bugs and star wars : the hazards of unsafe computing /
by: Simons, G. L. (Geoffrey Leslie), 1939-
Published: (1989)
by: Simons, G. L. (Geoffrey Leslie), 1939-
Published: (1989)
The data center disaster consultant /
by: Lord, Kenniston W.
Published: (1977)
by: Lord, Kenniston W.
Published: (1977)
Nine steps to effective EDP loss control /
by: Eason, Tom S.
Published: (1982)
by: Eason, Tom S.
Published: (1982)
The data center disaster consultant /
by: Lord, Kenniston W.
Published: (1983)
by: Lord, Kenniston W.
Published: (1983)
Tutorial on computer security and integrity /
Published: (1977)
Published: (1977)
Checklist/guide for assessing data processing safeguards /
by: Elam, Phillip G.
Published: (1983)
by: Elam, Phillip G.
Published: (1983)
Risk management in action /
by: Pritchard, J. A. T. (John A. T.)
Published: (1978)
by: Pritchard, J. A. T. (John A. T.)
Published: (1978)
Computer operations : procedures and management /
by: Leeson, Marjorie
Published: (1978)
by: Leeson, Marjorie
Published: (1978)
The information systems security officer's guide : establishing and managing an information protection program /
by: Kovacich, Gerald L.
Published: (1998)
by: Kovacich, Gerald L.
Published: (1998)
A practical guide to security assessments /
by: Kairab, Sudhanshu
Published: (2005)
by: Kairab, Sudhanshu
Published: (2005)