Spelling suggestions: "subject:"6electronic data processing"" "subject:"belectronic data processing""
271 |
Techniques for the evaluation and improvement of computer-produced abstracts.Mathis, Betty Ann January 1972 (has links)
No description available.
|
272 |
Languages for specifying protection requirements in data base systems - a semantic model /Hartson, H. Rex January 1975 (has links)
No description available.
|
273 |
Design of event-driven protection mechanisms /Cohen, David January 1977 (has links)
No description available.
|
274 |
Performance analysis of the distributed loop computer network /Babi?, Gojko A. January 1978 (has links)
No description available.
|
275 |
Integration of data processing concepts in the secondary and post-secondary vocational programs in the state of Alabama /Franklin, Patricia Ann January 1978 (has links)
No description available.
|
276 |
Design and analysis of the Distributed Double-Loop Computer Network (DDLCN) /Wolf, Jacob J. January 1979 (has links)
No description available.
|
277 |
Security in Automatic Data Processing SystemsMendez, Eduardo G. 01 January 1976 (has links) (PDF)
Security in automatic data processing systems is concerned with the protection of equipment and data against unauthorized modifications or destruction, and accidental or intentional disclosure of information. This report consists of two parts: 1. An overview of current literature in the field. In this part, basic problems and solutions, terminology and concepts found in the theoretical aspects of data processing systems security are described. 2. A survey of the state of art in a sample area. During the survey, information about actual applications of security methods in the Orlando, Florida area was collected. This information was gathered by means of a questionnaire and it will permit a comparative analysis between the usage of security measures in large and small firms. It is hoped that this study will provide valuable information to both the computer practitioner and management and in addition, will create an awareness of the important role that the security function plays in an organization.
|
278 |
Justification of installing 4GL in Hong Kong environment.January 1988 (has links)
by Wu Chung Man, Ronnie. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1988. / Bibliography: leaves 43-45.
|
279 |
Security of distributed data systemsFinch, Steven D. January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
280 |
A model of the data processing manager in the 1980'sCartier, Gene N January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries
|
Page generated in 0.1039 seconds