Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of 11 on ... involves intelligence activities; involves cryptologic activities related to....
" ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct... "
Implementation of the Computer Security Act (Public Law 100-235): Hearing ... - Page 71
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1990 - 176 pages
Full view - About this book

The Code of Federal Regulations of the United States of America

Administrative law - 1990
...activities related to national security; (3) Involves the command and control of military forces; (4) Involves equipment that is an integral part of a weapon or weapon system; or (5) Is critical to the direct fulfillment of military or intelligence missions, excluding routine administrative...
Full view - About this book

The Code of Federal Regulations of the United States of America

Administrative law - 1990
...activities related to national security; (3) Involves the command and control of military forces; (4) Involves equipment that is an integral part of a weapon or weapon system; or (5) Is critical to the direct fulfillment of military or intelligence missions, excluding routine administrative...
Full view - About this book

Introduction to Certification and Accreditation: Information Systems Security

Candice A. Stark - 1994 - 65 pages
...activities related to national security, (3) involves the command and control of military forces, (4) involves equipment that is an integral part of a weapon or weapon system, or (5) is critical to the direct fulfillment of military or intelligence missions. The law also requires...
Full view - About this book

An Introduction to Computer Security: The Nist Handbook

Barbara Guttman, Edward A. Roback - Computers - 1995 - 276 pages
...Government, its contractors, or agents, that contain classified information or, as set forth in 10 USC 2315, that involves intelligence activities, involves...fulfillment of military or intelligence missions." 20 A discussion of how threats, vulnerabilities, safeguard selection and risk mitigation are related...
Full view - About this book

Information Technology Investment: Agencies Can Improve Performance, Reduce ...

United States. General Accounting Office - Administrative agencies - 1996 - 75 pages
...cryptologic activities related to national security, (3) involves command and control of military forces, (4) involves equipment that is an integral part of a weapon or weapon system, or (5) is critical to the direct fulfillment of military or intelligence missions. Sec. 5401 This section...
Full view - About this book

Information Assurance: Legal, Regulatory, Policy and Organizational ...

Information warfare - 1999
...data processing (ADP) equipment by the Department of Defense, but shall not be responsible for ADP equipment that is an integral part of a weapon or weapon system, test support for a weapon or weapon system, or information technology basic research and development....
Full view - About this book

Building A Global Information Assurance Program

Raymond J Curts, Douglas E. Campbell - Computers - 2002 - 424 pages
...cryptologic activities related to national security; (3) involves command and control of military forces; (4) involves equipment that is an integral part of a weapon or weapon system; or (5) is critical to the direct fulfillment of military or intelligence missions and does not include...
Limited preview - About this book

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

John McCumber - Computers - 2004 - 288 pages
...an agency or other organization on behalf of an agency, (1) the function, operation, or use of which involves intelligence activities; involves cryptologic...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Limited preview - About this book

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Susan Hansche - Computers - 2005 - 1024 pages
...function, operation, or use of which — —involves intelligence activities; -involves cryptologie activities related to national security; -involves...equipment that is an integral part of a weapon or weapons system; or -is critical to the direct fulfillment of military or intelligence missions (excluding...
Limited preview - About this book

Official (ISC)2 Guide to the CISSP CBK

Steven Hernandez, CISSP - Computers - 2006 - 1112 pages
...or by other organization on behalf of the organization: (1) the function, operation, or use of which involves intelligence activities; involves cryptologic...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF