|
|
Underlying technical models for information technology security: recommendations of the National Institute of Standards and Technology
U.S. Government
Paperback. Books LLC, Reference Series 2011-10-03.
ISBN 9781234366896
|
|
|
Hitta bokens lägsta pris
|
Förlagets beskrivning
Original publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] OCLC Number: (OCoLC)70690520 Subject: Computer security -- Standards -- United States. Excerpt: ... Prevent Recover Non-Support repudiation User or Process Audit Access Control Resource Enforcement Identification ( and naming ) Cryptographic Key Management Figure 3.2-4 Primary Accountability Services Maintaining accountability for user actions is performed primarily by the audit and non-repudiation services. Access control enforcement is also included as the primary generator of records of user actions. SP 800-33 Page 11 December 2001
Fler böcker av U.S. Government
Liknande böcker
Recensioner
Den här boken har tyvärr inte några recensioner ännu. Om du redan läst boken, skriv en recension!
Recensera boken
Skriv en recension och dela dina åsikter med andra. Försök att fokusera på bokens innehåll. Läs våra instruktioner för mer information.
Underlying technical models for information technology security: recommendations of the National Institute of Standards and Technology
Bokrecensioner » Underlying technical models for information technology security: recommendations of the National Institute of Standards and Technology
|
|
|
|
|
|
|