What people are saying - Write a review
We haven't found any reviews in the usual places.
Computers and Security
THE FIVE CRITICAL TASKS
12 other sections not shown
Other editions - View all
access control Access Management Control activity application program appropriate business information business management business operations business security manager changes channel classification classified information company classified computer security control systems costs curity data base data center decisions devices disk Distributed Computing EBCDIC effective EISC electronic information security Electronic Security employee encryption ensure essential establish example files five critical tasks hardware he/she hexadecimal his/her identification implementation important information age information management information resource information systems instructions integration involved job control language mation microcomputers monitoring operating system organization organizational output password personal computer personnel physical security procedures processor professional security manager profits protection puter responsibility return on assets risk role security coordinator security department security elements security function security program security staff security standards security systems storage tape telecommunications tion today's transmission unauthorized understand usually