Proceedings of...First Annual Symposium on Physical/Electronic Security, August 1985
Philadelphia, PA: Armed Forces Communications, 1985. First? Edition. First? Printing. Approx. 200, spiral bound, illus., diagrams, minor edge soiling. More
Philadelphia, PA: Armed Forces Communications, 1985. First? Edition. First? Printing. Approx. 200, spiral bound, illus., diagrams, minor edge soiling. More
Santa Monica, CA: RAND National Defense Research Institute, 2001. Presumed First Edition/First Printing. Trade paperback. xiv, 375, [3] pages. Footnotes. John Arquilla (born 1954) is an American analyst and academic of international relations. From 1989 Arquilla also worked as analyst for RAND. In 1993 he joined the faculty of the US Naval Postgraduate School, where he has since taught courses in national security affairs and defense analysis, while keeping his post at Rand till 2003. Arquilla worked as a consultant to General Norman Schwarzkopf during Operation Desert Storm (1991), as part of a group of RAND analysts assigned to him. During the Kosovo War (1998-1999) he assisted United States Deputy Secretary of Defense John Hamre on international information strategy. During the George W. Bush administration, Arquilla was one of many advisors to former Secretary of Defense Donald Rumsfeld (in office 2001-2006), who like Arquilla is an admirer of Andrew Marshall's RMA (Revolution in Military Affairs). David F. Ronfeldt spent 30+ years at RAND. He has worked mainly on ideas about information-age modes of conflict (e.g., cyberwar, netwar, swarming) and principles for cooperation (e.g., guarded openness, noopolitik). He is a co-author (mainly with John Arquilla) of In Athena’s Camp: Preparing for Conflict in the Information Age (1997), The Zapatista Social Netwar in Mexico (1998), Countering the New Terrorism (1998), The Emergence of Noopolitik: Toward an American Information Strategy (1999), Swarming and the Future of Conflict (2000), and Networks and Netwars: The Future of Terror, Crime, and Militancy (2001). More
Washington, DC: [U.S. Department of Energy?], 2000. 25, wraps (velobound with clear plastic over front cover), endnotes. More
Albuquerque, NM: U.S. Department of Energy, Albuquerque Operations Office, 1990. NWCNET-90-02 Version 1.0--Xerox reproduction (believed contemporary with publication date). Disbound, held together with a binder clip. [2], 26, [4] pages, printed on one side only. Rare surviving copy. The purpose of this document was to provide a list of tests to be performed when bring up a NWCnet note, after installing a major upgrade to the system - either software or hardware, upon suspicious performance of the system, or upon request of either local site management or DOE management. This document was expected to change to reflect evolving testing needs. Sites were encouraged to add site specific tests to this test suite. The original set of security tests was developed under the direction of the DOE Center for Computer Security. The original set of functional tests were developed by an independent test team charged with testing the initial operations of the NWCnet with electronic connections. The objective of the Nuclear Weapons Complex Network (NWCNet) was to facilitate the exchange, storage, and management of shareable product definition information classified as high as Secret Restricted Data. The NWCnet was designed to be be operated in a system-high manner by Q-cleared personnel. The NWCnet contained four service components: the Wide-Band Communications Network (WBCN), the Common File System (CFS), the Network Systems Corporation (NSC) Hyperchannel, and the local computing resources (worker computers). The worker computers allow local users to initiate data transfer utilizing the NWCnet. From the Internet: NWCNET stands for Nuclear Weapons Complex Network. This definition appears very rarely and is found in the following Acronym Finder categories: Military and Government. More
Boulder, CO: CEP Inc., 1985. Updated Edition. Wraps. 505 pages, wraps, illus., diagrams, tape residue at bottom of spine, some wear and soiling to covers. Lee Lapin, 1948–2009, was a popular surveillance and espionage author, best known for his offbeat, grammatically questionable, yet information-rich instructional book series, How to Get Anything On Anybody. The series is published by Paladin Press, is now in its third revision, and is frequently included in library collections across North America. Lapin reportedly lived on a small island off the coast of Marin County, California where, for relaxation, he raised wolves. Lee Lapin was the nom de plume of Scott French. He died January 11, 2009, at the home of his son in Colorado. More
New York: Simon & Schuster, 1991. First Printing. 368, notes on sources, index, some soiling to fore-edge, slight wear to DJ edges. More
Gaithersburg, MD: U.S. Dept. of Commerce, NIST, 1989. 28 cm, 15, wraps, mailing label removed from rear cover. More
Gaithersburg, MD: U.S. Department of Commerce, [1984]. 28 cm, 331, wraps, illus., damage to rear cover (soiling and hole). More
Rockville, MD: B-K Dynamics, Inc., 1986. Presumed First Edition, First printing. Velobound. [4], 55 pages, plus vugraphs and handout list (approximately another 50 pages). This report was prepared for the Safeguards and Security Program of the Los Alamos National Laboratory. This includes the course module text, the course module vugraphs, and List of course handouts. More
Redwood City, CA: Data Security Letter, 1990. Presumed First Edition, First printing this special issue. Periodical. 4 pages. One approximately 17 inch by 11 inch sheet printed on both sides and folded to create a 4 page periodical. The Data Security Letter was published 9 times a year. It's purpose was to help data security professionals by providing inside information and knowledgeable analysis of developments in computer and communications security. This special issue was, in part, a solicitation for subscriptions. This is a rare surviving piece of data security/computer security ephemera/technical literature associated with one of the pioneers in computer security who rose to prominence in the last quarter of the 20th century. She was a pioneer by any measure, but it is noteworthy that she was one of the early female cyber security experts to gain recognition in this emerging field. More
Washington DC: National Aeronautics and Space Administration, c1980. Xerox copy of Draft Instruction. Stapled in upper left corner. 5, [1] pages. The Information Resources Management Division was the responsible Office in NASA for this instruction. This was intended to replace NASA Management Instruction, NMI 2410.7, Assuring Security and Integrity of NASA Data Processing, July 13, 1979. From the internet version 7C establishes policy and responsibilities for ensuring appropriate levels of security and integrity for NASA automated information processing installations, systems, data, and related resources; and constitutes the NASA Automated Information Security (AIS) Program. [Additional NASA policy can be found in the NASA On-Line Directives Information System (NODIS) Library . This site provides quick access to all of NASA's Policy Directives (NPD's) {i.e., formerly NASA Management Instructions (NMI's)}, NASA's Procedures & Guidelines (NPG's) {i.e., formerly NASA Handbooks (NHB's)} and NASA's Policy Charters (NPC's).]. More
Washington, D.C. The White House, 1996. Wraps. i, 57 p. Includes illustrations. Illustrations in color. More
Carlisle, PA: U. S. Army War College, Strategic Studies Institute/Army War College Press, 2013. Presumed first edition/first printing. Trade paperback. viii, 267, [1] p. Includes illustrations. Endnotes. Abbreviations and Acronyms. More
San Francisco, CA: Morgan Kaufmann Publishers, c1996. Third Printing. 24 cm, 216, wraps, illus., bibliography, index, pencil erasure half-title, tape from business card ins fr cover, corners of some pgs bent. More
Albuquerque, NM: U. S. Department of Energy, Albuquerque Operations Office, Safeguards and Security Division, 1982. Presumed First Edition, First printing thus. Binderclipped loose three hole punched pages. Stiff covers (front and back), v, [1], 57 pages (most sheets printed double-sided), and 8 illustrations (single-sided). References. Glossary. Guidelines for Computer Security Personnel. Three-hole punched, but not in a binder. Held together with a binder clip. It was the policy of the DOE ALO that Restricted Data, Formerly Restricted Data, and classified National Security Information be adequately protected. Classified data stored in or processed by computers, computer networks, word processing systems, and other electronic equipment had to be protected against unauthorized disclosure, destruction, and modification. The level of protection implemented at a specific ADP facility was to be based on the volume and sensitivity of the data processes, the operational requirements imposed by the organization's mission, and the risks presented at the site. The DOE computer security program was designed to be consistent with all applicable Federal policies, procedures, and standards. More
Washington, DC: GAO, 1999. Quarto, 51, wraps, footnotes, figures, appendices, bibliography. More
Washington, DC: GAO, 1999. quarto, 11, wraps, footnotes, figure Testimony of Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Senate Committee on the Judiciary, Subcommittee on Technology, Terrorism and Government Information. More
Washington, DC: GAO, 2000. quarto, 14, wraps, footnotes. More
Washington, DC: GPO, 2004. 88, wraps, illus. More
Washington, DC: GPO, 2005. First? Edition. First? Printing. 71, wraps, illus. More
Washington, DC: GPO, 2004. First? Edition. First? Printing. 88, wraps, illus. More
Washington, DC: GPO, 1998. 24 cm, 25, wraps, appendix. More
Washington, DC: GPO, 1994. 24 cm, 138, wraps, illus. One of the earlier Congressional hearings on the Internet. More
Washington, DC: GPO, 2005. First? Edition. First? Printing. 129, wraps, illus. Serial No. 108-59. More
Washington, DC: GPO, 2000. 24 cm, 37, wraps. More