Information Security Hits the Front page: How Safe Is Safe Enough?
Stamford, CT: Gartner Group, Inc., 1999. First? Edition. First? Printing. 160, wraps, illus., diagrams, glossary and acronyms, some wear and soiling to covers. More
Stamford, CT: Gartner Group, Inc., 1999. First? Edition. First? Printing. 160, wraps, illus., diagrams, glossary and acronyms, some wear and soiling to covers. More
Washington DC: U.S. Department of Defense, ASD(C3I), 1984. Xerox copy of briefing slides. Stapled in upper right corner. 18 sheets. Latham was the ASD(C3I) Assistant Secretary of Defense (Command, Control, Communications, & Intelligence). He later left to become a vice president with the Computer Sciences Corp. in Falls Church, Va. Latham joined the Pentagon staff shortly after President Reagan assumed office in 1981. He became the assistant defense secretary for command, control, communications and intelligence in 1984. Prior to 1981, Latham held a number of defense-related jobs in private industry, including positions with the Martin Marietta Corp. and RCA. A former Air Force officer, Latham also had worked previously for the National Security Agency. He chaired the National Telecommunications and Information Systems Security Committee (NTISSCI) which was addressed in this briefing to the Defense Science Board. More
New York: Viking Penguin Inc., 2001. First Printing. 352, index. More
Rockville, MD: B-K Dynamics, Inc., 1986. Presumed First Edition, First printing. Velobound. [4], 55 pages, plus vugraphs and handout list (approximately another 50 pages). This report was prepared for the Safeguards and Security Program of the Los Alamos National Laboratory. This includes the course module text, the course module vugraphs, and List of course handouts. More
Redwood City, CA: Data Security Letter, 1990. Presumed First Edition, First printing this special issue. Periodical. 4 pages. One approximately 17 inch by 11 inch sheet printed on both sides and folded to create a 4 page periodical. The Data Security Letter was published 9 times a year. It's purpose was to help data security professionals by providing inside information and knowledgeable analysis of developments in computer and communications security. This special issue was, in part, a solicitation for subscriptions. This is a rare surviving piece of data security/computer security ephemera/technical literature associated with one of the pioneers in computer security who rose to prominence in the last quarter of the 20th century. She was a pioneer by any measure, but it is noteworthy that she was one of the early female cyber security experts to gain recognition in this emerging field. More
Upper Saddle River, NJ: Prentice Hall PTR, 1999. Second Paperback printing [stated]. Trade paperback. xlv, [1], 380, [6] pages plus CD in pocket at the back. Illustrations. Appendix. Glossary. Index. This is one of the Charles R. Goldfarb Series on Open Information Management. Prologue by Dr. Ruth David. Afterword by William Studeman. Fredrick Martin as a NSA executive helped enhance Intelink, and at the time this was published he was helping the CIA move forward to the "Agile Intelligence Enterprise" of the future. Throughout this book, he shares his expert knowledge, with a focus on applying it to the needs of business systems. More
Redmond, WA: Microsoft, 2007. Quarto, 91, wraps, color charts, tables, glossary, appendices. More
Framingham, MA: MIS Training Institute, 1987. Presumed First Edition, First printing thus. Wraps. 24 pages plus covers. Mailing label on back cover. Illustrations (color on front cover). Founded in 1978, MIS Training Institute (MISTI) is the international leader in audit, IT audit and information security training, with offices in Boston and London. MISTI’s expertise draws on experience gained in training more than 200,000 delegates across five continents. Helping audit and info security professionals stay at the top of their game has always been at the core of MISTI’s mission. MISTI’s course curriculum covers the most up-to-the-minute topics, provides proven audit and security practices, and delivers the information needed to be successful in today’s organizations. All MISTI training courses and conferences are led by industry experts…hands-on pros who have been in the field and who practice what they teach. Attendees of MISTI events benefit from unbiased practices, proven strategies, and lessons learned in the real-world. More
Miamisburg, OH: Department of Energy, Dayton Area Office, 1986. Presumed First printing of Issue 2. Staplebound, Three-hole punched. 15 pages, printed on one side only. The author was a federal employee with the Dayton Area Office (DAO). Few Mound administrative documents have survived after its closure. Mound Laboratories in Miamisburg, Ohio was an Atomic Energy Commission (later Department of Energy) facility for nuclear weapon research during the Cold War, named after the nearby Miami Indian burial mound. The laboratory grew out of the World War II era Dayton Project (a site within the Manhattan Project) where the neutron generating triggers for the first plutonium bombs were developed. Post-war construction of a permanent site for Dayton Project activities began in 1947. The lab was originally known as the Dayton Engineer Works. The lab began operations in 1948 and was managed by Monsanto. Mound produced detonators, cable assemblies, timers, firing sets, and other equipment. In 1954, Mound began working with tritium. The lab disassembled bomb components, recovering the tritium within and sending it for repurification at Savannah River Site. Mound supplied enriched non-radioactive isotopes. The lab also produced plutonium-238-powered thermoelectric heat sources called SNAP or Systems for Nuclear Auxiliary Power for the U.S. space program. Mound was declared a Superfund site and was put on the National Priorities list in 1989. A decision was made to close the plant by 2006. Cleanup of the site began in 1995. Work with tritium ended in 1997. Cleanup of the site finished in 2010. More
Washington DC: National Aeronautics and Space Administration, c1980. Xerox copy of Draft Instruction. Stapled in upper left corner. 5, [1] pages. The Information Resources Management Division was the responsible Office in NASA for this instruction. This was intended to replace NASA Management Instruction, NMI 2410.7, Assuring Security and Integrity of NASA Data Processing, July 13, 1979. From the internet version 7C establishes policy and responsibilities for ensuring appropriate levels of security and integrity for NASA automated information processing installations, systems, data, and related resources; and constitutes the NASA Automated Information Security (AIS) Program. [Additional NASA policy can be found in the NASA On-Line Directives Information System (NODIS) Library . This site provides quick access to all of NASA's Policy Directives (NPD's) {i.e., formerly NASA Management Instructions (NMI's)}, NASA's Procedures & Guidelines (NPG's) {i.e., formerly NASA Handbooks (NHB's)} and NASA's Policy Charters (NPC's).]. More
Washington, DC: Nat Classification Mgmt Soc, 1986. 23 cm, 290, wraps, covers somewhat worn and soiled, some edge wear. More
Washington, D.C. The White House, 1996. Wraps. i, 57 p. Includes illustrations. Illustrations in color. More
Gaithersburg, MD: U.S. Department of Commerce, 1985. First? Edition. First? Printing. 28 cm, 214, wraps, tables, figures, references, some wear and soiling to covers. More
Boston, MA: Warren, Gorham & Lamont, c1987. 25 cm, approx. 350, 1987 cumulative supplement only, wraps, references, index, some wear and soiling to covers. More
New York: Scribner, c1983. First Printing. 24 cm, 352, illus. More
Chapel Hill, NC: The University of North Carolina Press, 1995. First Printing [Stated]. Hardcover. xix, [3], 310 pages. Tables. Figures. Preface, Acknowledgments, Appendixes, Notes, and Index. Also includes chapters on Privacy, Technology, and Public Policy; Privacy as a Philosophical and Legal Concept; Privacy in American Society, Information Privacy: Recording Our Transactions; Communication Privacy: Transmitting Our Messages; Psychological Privacy: Evaluating Our Thoughts; Congress, Privacy, and Policy Decisions; and Privacy and the Common Good: Implications for Public Policy. Legislating Privacy explores the dynamics of congressional policy formulation on privacy issues and explains why legislation has lagged behind technological development. According to Regan, supporters of the new technologies succeed in delaying and ultimately weakening pro privacy legislation because they were better organized and had greater financial resources than their opponents. In addition, Reagan argues, privacy proponent made a strategic error by promoting the concept of privacy as a fundamental individual right. This definition of the nature and value of privacy met with only limited congressional support, and in each successive debate, the importance of privacy diminished. According to Regan, we will need an expanded understanding of the social value of privacy if we are to achiever greater protection from emerging technologies such as Caller ID and genetic testing. She argues that a recognition of the public and collective importance of privacy will shift both the terms of the policy debate and the patterns of interest-group action in future congressional activity on privacy issues. More
New York: Berkley Books, 2004. First pbk. printing [stated]. Mass-market paperback. 371 p. More
New York: Simon & Schuster, c1992. First Printing. 25 cm, 224, bibliography, index, slight sticker residue on DJ. More
Carlisle, PA: U. S. Army War College, Strategic Studies Institute/Army War College Press, 2013. Presumed first edition/first printing. Trade paperback. viii, 267, [1] p. Includes illustrations. Endnotes. Abbreviations and Acronyms. More
Albuquerque, NM: Sandia National Laboratories, 1994. Presumed First Edition, First printing thus. Wraps. 28 cm, 72 pges. Wraps, illus., some wear and soiling to covers. More
Washington, DC: National Academy Press, 1999. 24 cm, 331, related ephemera laid in. More
San Francisco: Computer Security Institute, c1986. Conference print, presumably first issue thus. Stapled in upper left corner. 46 pages. Illustrations. Presentation W-1 at the Thirteenth Annual Computer Security Conference. This includes a Draft ADP Security Program Publication and a draft security program management plan. The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. It was founded in 1974. The author was the Manager of the ADP Security Branch, Information Resource Management Department, U.S. Postal Service. He was responsible for the Postal Service computer and automated information security programs. His experience in ADP Security started in 1975 when he assumed responsibility for ADP Security while with the U.S. Army Management Systems Support Agency in the Pentagon. He was a graduate of the Army's Command and General Staff College and was a member of the American Society for Industrial Security. More
Washington DC: Election Administration Reports, 1985. Presumed First Edition, First printing thus. Pages stapled at top left corner. 6, [2] pages. Minor wear and soiling noted. The lead story is on a Defense Department Computer Security Unit interested in Vote Tally Fraud. Other articles dealt with Campaign Finance, Sentencing of Voters for disrupting Polls, Ballot Access, Federal Court ruling on Deputy Registrars, and a Federal Judge striking down a New York State Primary run-off law. Also the Defense Department was soliciting comments on the then latest draft of the Federal Post Card Application (FPCA) form for requesting an absentee ballot. Some issues and concerns are long-lasting or reappear with some regularity. Election Administration Reports is a bi-weekly publication that covers a range of topics affecting election administrators. Its goal is to provide you with comprehensive, unbiased coverage of issues that impact people - from new voting technology to important legislation, from government reports to local, state and national election best practices. For the past 47 years, Election Administration Reports has provided balanced, unbiased, and factual coverage of a range of election administration issues. Its staff of experts brings with it a wealth of election administration knowledge and expertise. More
Washington, DC: GPO, 1985. First? Printing. 28 cm, 64, wraps, illus., bibliography, index, some wear and soiling. More
Washington DC: U. S. Government Printing Office, 1985. Presumed First Edition, First printing. Wraps. Various paginations (NBS Form 114A (Rev. 2-80) lists 66 pages. References. Additional information, a self-audit checklist, and a guide to security products for personal computers are provided as appendices. Index. Cover has some wear and soiling. The use of personal computer systems (often called desktop or professional computers) in the office and home environment has placed increasingly powerful information system technology in the hands of growing numbers of users. While providing many benefits, the use of such small computer systems may introduce serious potential information security risks. Although considerable progress has been made in security management and technology for large-scale centralized data processing systems, relatively little attention has been given to the protection of small systems. As a result, significant exposures may exist which can threaten the confidentiality, integrity, or availability of information resources associated with such systems. More