21st National Information Systems Security Conference

21st National Information Systems Security Conference

4.11 - 1251 ratings - Source

Whenever feasible, the system shall enforce these rules by automated means ( e.g., provide a motion detector for an unattended gateway computer). ... Rules for accountability practices shall be formally documented in the End Usera#39;s Manual. ... a System Administratora#39;s Manual (or equivalent aquot;Trusted Facility Manualaquot; content), an End Usera#39;s Manual, or (equivalent aquot;Security Features Usera#39;s Guideaquot; content).

Title:21st National Information Systems Security Conference
Author: National Institute of Standards and Technology (U.S.), National Computer Security Center (U.S.)
Publisher: - 1998

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA