A Five-year Plan, Meeting the Automatic Data Processing and Telecommunications Needs of the Federal Government, Volum 1

Office of Management and Budget, Office of Information and Regulatory Affairs, 1986

Hva folk mener - Skriv en omtale

Vi har ikke funnet noen omtaler på noen av de vanlige stedene.

Andre utgaver - Vis alle

Vanlige uttrykk og setninger

Populære avsnitt

Side 119 - Labor shall be to foster, promote, and develop the welfare of the wage earners of the United States, to improve their working conditions, and to advance their opportunities for profitable employment.
Side 38 - America's competitiveness in the world economy; administers programs to prevent unfair foreign trade competition; provides social and economic statistics and analyses for business and government planners; provides research and support for the increased use of scientific, engineering, and technological development...
Side 119 - Federal labor laws guaranteeing workers' rights to safe and healthful working conditions, a minimum hourly wage and overtime pay, freedom from employment discrimination, unemployment insurance, and workers' compensation. The Department also protects workers' pension rights; provides for job training programs; helps workers find jobs; works to strengthen free collective bargaining; and keeps track of changes in employment, prices, and other national economic measurements. As the Department seeks to...
Side 334 - This document provides, in the form of questions and answers, the background, and basic essential information required to understand the developmental process for automatic data processing (ADP) contingency plans. The primary intended audience consists of executives and managers who depend on ADP resources and services, yet may not be directly responsible for the daily management or supervision of data processing activities or facilities.
Side 330 - The modes specify how data will be encrypted (cryptographically occurrence and the damage protected) and decrypted (returned to original form). The modes included in this standard are the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the - Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode.
Side 202 - The mission of the United States Information Agency is to help achieve United States foreign policy objectives by (a) influencing public attitudes in other nations, and (b) advising the President, his representatives abroad, and the various departments and agencies on the implications of foreign opinion for present and contemplated United States policies, programs and official statements.
Side 330 - Provides explicit advice on achieving database integrity and security control. Identifies integrity and security problems and discusses procedures and methods which have proven effective in addressing these problems. Provides an explicit, step-by-step procedure for examining and verifying the accuracy and completeness of a database.
Side 328 - Provides guidance to Federal organizations In developing physical security and risk management programs for their ADP facilities. Covers security analysis, natural disasters, failure of supporting utilities, system reliability, procedural measures and controls, protection of off-site facilities, contingency plans security awareness, and security audit. Can be used as a checklist for planning and evaluating security of computer systems.
Side 81 - Services is the Cabinet-level department of the Federal executive branch most concerned with people and most involved with the Nation's human concerns. In one way or another — whether it is mailing out social security checks or making health services more widely available — HHS touches the lives of more Americans than any other Federal agency. It is literally a department of people serving people, from newborn infants to our most elderly citizens.
Side 330 - September 1980 Provides guidance in the selection and implementation of techniques for authenticating the users of remote terminals in order to safeguard against unauthorized access to computers and computer networks. Describes use of passwords, identification tokens, verification by means of personal attributes, identification of remote devices, role of encryption in network access control, and computerized authorization techniques.

Bibliografisk informasjon