Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

1,135 results
  1. ... Security and Advanced Network Planning research focuses on computer security, ... reduce security problems. Work on the LHC Network has continued to ...
  2. ... day. As OCCS staff learn more about these systems, they can increasingly intervene successfully rather than merely alert the other divisions to problems. The computer facility also has 24 by 7 physical security. Newly installed monitoring tools and alarms are used ...
  3. ... contexts much work has been done on this problem. In CONGEN we rely on the standard protection mechanisms built into the computer system, but we will need more security if we are to satisfy users in chemical ...
  4. ... on the standard protection mechanisms built into the computer system, but we ... into a single problem solver. In the context of DENDRAL this combination ...
  5. ... posture and fully supports the Department of Homeland Security (DHS) Continuous ... rank problems for priority resolution. Continuous monitoring of networks for ...
  6. ... difficulty of maintaining and upgrading present software and systems. Ms. ... his concern about the security of the file, and there was a discussion ...
  7. ... 7(3):35-42 How to establish a computer security program. Isaacson G. Health Care ... medical record systems. Stratmann WC, et al. Health Serv Res 1982 ...
  8. ... Mod Hosp 108: 25-6 My 67 New computer system uses hospital's cost ... this year, social security officials indicate. (N) Mod Nurs Home Admin 21: ...
  9. ... to perform system monitoring, intervention, administrative maintenance and security ... isolation of problems or potential problems. As more UNIX servers are ...
  10. ... of management input in the development of information systems security. Haeckel DA, et al. Manage Rev 1983 Aug; 72(8):26-8, 38-41 Security problems proliferates along with personal computers. Ward GM, et al. Manage Rev 1983 Jul; ...
first · previous · 1 · 2 · 3 · 4 · 5 · 6 · 7 · 8 · 9 · 10 · next · last