Campos ocultos
Livros Livros
" ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct... "
An Introduction to Computer Security: The NIST Handbook - Página 21
de Barbara Guttman, Edward A. Roback - 1996 - 276 páginas
Visualização completa - Sobre este livro

The Code of Federal Regulations of the United States of America

1985 - 738 páginas
...activities related to national security; (3) Involves the command and control of military forces; (4) Involves equipment that is an integral part of a weapon or weapon system; or (5) Is critical to the direct fulfillment of military or intelligence missions, excluding routine administrative...
Visualização completa - Sobre este livro

The Code of Federal Regulations of the United States of America

1988 - 572 páginas
...activities related to national security; (3) Involves the command and control of military forces; (4) Involves equipment that is an integral part of a weapon or weapon system; or (5) Is critical to the direct fulfillment of military or intelligence missions, excluding routine administrative...
Visualização completa - Sobre este livro

Implementation of the Computer Security Act (Public Law 100-235 ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1990 - 202 páginas
...its contractors, or agents, that contain classified information or, as set forth in 10 UsC Section 2315, that involves intelligence activities, involves...fulfillment of military or intelligence missions. Mr. TORRICELLI. Thank you, Mr. Andrews. This has been a remarkable week for the issuing of Government...
Visualização completa - Sobre este livro

Introduction to Certification and Accreditation: Information Systems Security

Candice A. Stark - 1994 - 75 páginas
...activities related to national security, (3) involves the command and control of military forces, (4) involves equipment that is an integral part of a weapon or weapon system, or (5) is critical to the direct fulfillment of military or intelligence missions. The law also requires...
Visualização completa - Sobre este livro

Information Technology Investment: Agencies Can Improve Performance, Reduce ...

United States. General Accounting Office - 1996 - 266 páginas
...cryptologic activities related to national security, (3) involves command and control of military forces, (4) involves equipment that is an integral part of a weapon or weapon system, or (5) is critical to the direct fulfillment of military or intelligence missions. Sec. 5401 This section...
Visualização completa - Sobre este livro

Information Assurance: Legal, Regulatory, Policy and Organizational ...

1999 - 556 páginas
...data processing (ADP) equipment by the Department of Defense, but shall not be responsible for ADP equipment that is an integral part of a weapon or weapon system, test support for a weapon or weapon system, or information technology basic research and development....
Visualização completa - Sobre este livro

Building A Global Information Assurance Program

Raymond J Curts, Douglas E. Campbell - 2017 - 424 páginas
...cryptologic activities related to national security; (3) involves command and control of military forces; (4) involves equipment that is an integral part of a weapon or weapon system; or (5) is critical to the direct fulfillment of military or intelligence missions and does not include...
Visualização parcial - Sobre este livro

Cybersecurity: Getting it Right : Hearing of the Subcommittee on ...

United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development - 2005 - 84 páginas
...its contractors, or agents, that contain classified information or, as set forth in 10 USC Section 2315, that involves intelligence activities, involves...fulfillment of military or intelligence missions. monitor the flow of information around your border and detect suspicious activity. The best way to...
Visualização completa - Sobre este livro

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

John McCumber - 2004 - 290 páginas
...an agency or other organization on behalf of an agency, (1) the function, operation, or use of which involves intelligence activities; involves cryptologic...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Visualização parcial - Sobre este livro

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Susan Hansche - 2005 - 814 páginas
...function, operation, or use of which — —involves intelligence activities; -involves cryptologie activities related to national security; -involves...equipment that is an integral part of a weapon or weapons system; or -is critical to the direct fulfillment of military or intelligence missions (excluding...
Visualização parcial - Sobre este livro




  1. Minha biblioteca
  2. Ajuda
  3. Pesquisa de livros avançada