Hidden fields
Libros Libros
" ... involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct... "
An Introduction to Computer Security: The NIST Handbook - Página 21
por Barbara Guttman, Edward A. Roback - 1996 - 276 páginas
Vista completa - Acerca de este libro

The Language of Compliance: A Glossary of Terms, Acronyms, and Extended ...

Dorian J. Cougias, Marcelo Halpern - 2006 - 471 páginas
...an agency or other organization on behalf of an agency: 1) the function, operation, or use of which involves intelligence activities; involves cryptologic...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Vista previa limitada - Acerca de este libro

Official (ISC)2 Guide to the CISSP CBK

Steven Hernandez, CISSP - 2006 - 1118 páginas
...or by other organization on behalf of the organization: (1) the function, operation, or use of which involves intelligence activities; involves cryptologic...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Vista previa limitada - Acerca de este libro

Building and Implementing a Security Certification and Accreditation Program ...

Patrick D. Howard - 2005 - 343 páginas
...(1) the function, operation, or use of which involves intelligence activities; involves cryptologie activities related to national security; involves...equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions (excluding...
Vista previa limitada - Acerca de este libro




  1. Mi biblioteca
  2. Ayuda
  3. Búsqueda avanzada de libros