Proceedings of the fifth annual conference (see title) held in Tucson, AZ, December, 1989. Addresses the lack of trust that computers can properly control access to widely varying degrees of sensitive information. Treats unclassified systems security, risk management, crime, audit applications, architecture and mechanisms, and security policy and models. Acidic paper; no subject index. Annotation copyrighted by Book News, Inc., Portland, ORThe third and final interval consists of three DOD- STD-2167A design phases: CSC Integration and Testing, CSCI Testing, and System Integration and Testing. These phases are focused on ... [CSOM] Computer Software Operatora#39;s Manual 6 .
|Title||:||Fifth Annual Computer Security Applications Conference, Tucson, Arizona, December 4-8, 1989|