Date: 2012-12-05 11:33:21Cyberwarfare National Institute of Standards and Technology Computer law Federal Information Security Management Act Security controls Information security OMB Circular A-130 Standards for Security Categorization of Federal Information and Information Systems Vulnerability Computer security Security Data security | | INFORMATION SECURITY – INTERIM SYSTEM AND SERVICES ACQUISITION PROCEDURESAdd to Reading ListSource URL: www.epa.govDownload Document from Source Website File Size: 187,35 KBShare Document on Facebook
|