<--- Back to Details
First PageDocument Content
Cyberwarfare / National Institute of Standards and Technology / Computer law / Federal Information Security Management Act / Security controls / Information security / OMB Circular A-130 / Standards for Security Categorization of Federal Information and Information Systems / Vulnerability / Computer security / Security / Data security
Date: 2012-12-05 11:33:21
Cyberwarfare
National Institute of Standards and Technology
Computer law
Federal Information Security Management Act
Security controls
Information security
OMB Circular A-130
Standards for Security Categorization of Federal Information and Information Systems
Vulnerability
Computer security
Security
Data security

INFORMATION SECURITY – INTERIM SYSTEM AND SERVICES ACQUISITION PROCEDURES

Add to Reading List

Source URL: www.epa.gov

Download Document from Source Website

File Size: 187,35 KB

Share Document on Facebook

Similar Documents

On Proebsting’s Law Kevin Scott Department of Computer Science Technical Report CSUniversity of Virginia Charlottesville, VA 22904

DocID: 1vloa - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uIL3 - View Document

ATTENTION: Starting January 1, 2011 New Jersey State law states that the following can no longer be put out with your garbage: PERSONAL COMPUTERS (LAPTOP & DESKTOP)• COMPUTER MONITORS • TELEVISIONS

DocID: 1uHkR - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uwol - View Document

Lecture 2.1 Amdahl’s Law ENInstructor: Randal Burns 31 January 2018 Department of Computer Science, Johns Hopkins University

DocID: 1uri2 - View Document