100–108. F.M.A. Silva, “A Transaction Model Based on Mobile Agents,” Ph.D. Thesis, Technical University, Berlin, Germany, 1999. M. Dror, W. Kubiak, and P. Dell'Olmo, “'Strong'–'Weak' Chain Constrained Scheduling,” Ricerca Operativa 27 ...
"Donald L. Evans, United Space Alliance, Houston, Texas, US"If you could choose only one primer, this is the THE book." Perry Luzwick, Director, Information Assurance Architectures, Logicon, US
See risk management mandatory access control (MAC), 191 McKinnon, G., 51 McMahon, J., 202 memory, protection of, 195 Microsoft, 233 military security, 191. See also Department of Defense misinformation, 23 mission statements, ...
Networking Personal Computers with TCP/IP; Craig Hunt; O'Reilly; 1995 21. Practical Internetworking with TCP/IP & UNIX; Smoot Carl-Mitchell & John S. Quarterman; Addison-Wesley; 1994 22. Securing the Domain Name System; Diane Davidowicz ...
Figure 4: Organisational processes and the context for information assurance Internal environment Internal stakeholders External stakeholders External environment Internal processes influenced Communication Risk management Education ...
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program.
Donald L. Evans, United Space Alliance, Houston, Texas, US If you could choose only one primer, this is the THE book. Perry Luzwick, Director, Information Assurance Architectures, Logicon, US
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program.