Computer security--to provide and protect your critical business information





Computer security in operating systems and data networks

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003356479 / 1992-03-18
Date of Creation:
of the last of the contributions to be completed: 1991
Title:
Computer security in operating systems and data networks / by Wallace W. Wilson.
Copyright Note:
C.O. correspondence.
Copyright Claimant:
Wallace William Wilson, 1949-
Appears in:
Issue Oct91. (EEA training program ; section 130) Pub. 1991-10-01.
Issue Apr91. Pt. 1. (EEA training program ; no. 123) Pub. 1991-04-01.
Names:
Wallace William Wilson 1949-

Computer security engineering

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003683836 / 1993-11-30
Date of Publication:
April 1, 1993
Date of Creation:
1993
Title:
Computer security engineering : an analysis of fundamental considerations.
Basis of Claim:
New Matter: revisions & additions.
Previous Registration:
Prev. reg. 1993, TXu 580-107.
Description:
Sheets.
Number of similar titles:
1
Variant title:
Computer security engineering : an analysis of fundamental considerations
Copyright Claimant:
Alexander Jameson West, 1947-
Names:
Alexander Jameson West 1947-

Computer security in open networks OSI to kerberos

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004077298 / 1995-08-28
Date of Publication:
June 15, 1995
Date of Creation:
1994
Title:
Computer security in open networks OSI to kerberos.
Description:
Microfiche.
Copyright Claimant:
William A. Horan, Jr., 1965-
Names:
Horan, William A., Jr., 1965-

Computer security handbook

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004254752 / 1996-04-05
Date of Publication:
September 8, 1995
Date of Creation:
1995
Title:
Computer security handbook / edited by Arthur E. Hutt ; Seymour Bosworth, associate editor, Douglas B. Hoyt, associate editor.
Edition:
3rd ed.
Basis of Claim:
New Matter: revisions & additions.
Previous Registration:
Prev. reg.
Imprint:
New York : J. Wiley, c1995.
Description:
1 v.
Number of similar titles:
3
Copyright Claimant:
John Wiley & Sons, Inc. (employer for hire)
Names:
Douglas B. Hoyt

Copyrights records by Hoyt, Douglas B.


Seymour Bosworth
Arthur E. Hutt
John Wiley & Sons, Inc. (9150 documents)
example document: Independent nursing intervention. By Mariah Snyder

Copyrights records by John Wiley & Sons, Inc.



Computer security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004596939 / 1997-06-26
Date of Publication:
January 2, 1997
Date of Creation:
1997
Title:
Computer security.
Description:
32 p.
Number of similar titles:
72
Copyright Claimant:
Bureau of Business Practice
Names:
Bureau of Business Practice (167 documents)
example document: Benchmarking

Copyrights records by Bureau of Business Practice



Computer security awareness

Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TX0004905604 / 1998-12-14
Date of Publication:
May 1, 1998
Date of Creation:
1998
Title:
Computer security awareness.
Basis of Claim:
New Matter: additional text.
Previous Registration:
Prev. reg. 1986, TX 1-963-425.
Description:
Computer program.
Number of similar titles:
4
Copyright Claimant:
DPEC, Inc.
Notes:
Printout only deposited.
Names:
DPEC, Inc. (138 documents)
example document: Computer security awareness

Copyrights records by DPEC, Inc.



Computer security, dependability, and assurance

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005181216 / 2000-03-31
Date of Publication:
July 7, 1998
Date of Creation:
1998
Title:
Computer security, dependability, and assurance : from needs to solutions : proceedings, 7-9 July 1998 York, England, 11-13 November 1998 Williamsburg, Virginia / sponsored by the Office of Naval Research, National Science Foundation.
Imprint:
Los Alamitos, CA : IEEE Computer Society, c1999.
Description:
213 p.
Copyright Claimant:
Institute of Electrical and Electronics Engineers, Inc. (employer for hire)
Names:
Institute of Electrical and Electronics Engineers, Inc. (2035 documents)
example document: Real-Time Systems Symposium

Copyrights records by Institute of Electrical and Electronics Engineers, Inc.


National Science Foundation. Office of Naval Research

Computer security handbook

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005547192 / 2002-06-18
Date of Publication:
March 28, 2002
Date of Creation:
2002
Title:
Computer security handbook / edited by Seymour Bosworth, M. E. Kabay.
Edition:
4th ed.
Basis of Claim:
New Matter: additions & revisions.
Previous Registration:
Prev. reg. 1996, TX 4-254-752.
Imprint:
New York : J. Wiley, c2002.
Description:
1 v.
Number of similar titles:
3
Copyright Claimant:
John Wiley & Sons, Inc. (employer for hire)
Names:
M. E. Kabay
Seymour Bosworth
John Wiley & Sons, Inc. (9150 documents)
example document: A Laboratory manual for photographic science

Computer security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005632756 / 2003-01-10
Date of Publication:
January 7, 2003
Date of Creation:
2002
Title:
Computer security : perspectives and culture. a study of first year community college students and proposed responsible computing guide.
Rights and Permissions:
Rights and permissions info. on CORDS appl. in CO.
Description:
Computer text data.
Number of similar titles:
72
Variant title:
Computer security : perspectives and culture. a study of first year community college students and proposed responsibl
Copyright Claimant:
Thomas Clay Mangus
Notes:
Electronic registration.
Authorship on Application:
entire text: Thomas Clay Mangus.
Names:
Thomas Clay Mangus

Computer security incident handling step by step

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005656698 / 2002-07-29
Date of Publication:
October 1, 2001
Date of Creation:
2001
Title:
Computer security incident handling step by step : version 2.2.
Basis of Claim:
New Matter: additions & revisions.
Previous Registration:
Prev. reg.
Copyright Note:
C.O. correspondence.
Description:
49 p.
Number of similar titles:
1
Copyright Claimant:
Sans Institute
Names:
Sans Institute

Copyrights records by Sans Institute



Computer security incident handling step by step

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005656702 / 2002-07-29
Date of Publication:
May 1, 1998
Date of Creation:
1998
Title:
Computer security incident handling step by step : version 1.5.
Copyright Note:
C.O. correspondence.
Description:
37 p.
Number of similar titles:
1
Copyright Claimant:
Sans Institute
Names:
Sans Institute

Computer security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005669484 / 2003-01-17
Date of Publication:
December 13, 2002
Date of Creation:
2001
Title:
Computer security : art and science / Matt Bishop.
Imprint:
Boston : Addison-Wesley, c2003.
Description:
1,084 p.
Number of similar titles:
72
Variant title:
Computer security : art and science
Copyright Claimant:
Pearson Education, Inc.
Names:
Matthew Bishop (10 documents)
example document: Show me what you've got

Copyrights records by Bishop, Matthew


Pearson Education, Inc. (6087 documents)
example document: Corrections in America

Copyrights records by Pearson Education, Inc.



Computer security incident handling

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005748009 / 2003-04-25
Date of Publication:
March 1, 2003
Date of Creation:
2003
Title:
Computer security incident handling : an action plan for dealing with intrusions, cyber-theft, and other security-related events / Stephen Northcutt.
Edition:
Version 2.3.1.
Basis of Claim:
New Matter: revisions & additions.
Previous Registration:
Prev. reg. 2002, TX 5-656-698.
Series:
Sans step-by-step series
Imprint:
[Bethesda, MD] : Sans Press, 2003.
Description:
62 p.
Number of similar titles:
2
Other Title:
Sans step-by-step series
Copyright Claimant:
Sans Institute (employer for hire)
Names:
Stephen Northcutt (18 documents)
example document: Intrusion signatures and analysis

Copyrights records by Northcutt, Stephen


Sans Institute

Computer security sourcebook

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005817763 / 2003-06-25
Date of Publication:
June 18, 2003
Date of Creation:
2003
Title:
Computer security sourcebook / edited by Wilma R. Caldwell.
Copyright Note:
C.O. correspondence.
Series:
Security reference series
Imprint:
Detroit : Omnigraphics, c2003.
Description:
514 p.
Copyright Claimant:
Omnigraphics,Inc. (employer for hire)
Names:
Wilma R. Caldwell
Omnigraphics,Inc.

Computer security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005939965 / 2003-09-12
Date of Publication:
July 28, 2003
Date of Creation:
2003
Title:
Computer security : 20 things every employee should know / Ben Rothke.
Basis of Claim:
New Matter: new text.
Copyright Note:
C.O. correspondence.
Description:
51 p.
Number of similar titles:
72
Similar Title:
Variant title:
Computer security : 20 things every employee should know
Copyright Claimant:
McGraw-Hill Companies, Inc.
Names:
Ben Rothke
McGraw-Hill Companies, Inc. (7889 documents)
example document: Instrumental music teachers. By Science Research Associates, Inc

Copyrights records by McGraw-Hill Companies, Inc.



Computer security assurance using the common criteria

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005978989 / 2004-06-21
Date of Publication:
June 1, 2004
Date of Creation:
2004
Title:
Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt.
Imprint:
Clifton Park, NY : Delmar Learning, c2005.
Description:
278 p.
Copyright Claimant:
Thomson Delmar Learning
Names:
Jim Breithaupt (1 documents)
example document: Building set applications for secure transactions
Mark S. Merkow (4 documents)
example document: Breaking through technical jargon

Copyrights records by Merkow, Mark S.


Thomson Delmar Learning (284 documents)
example document: 3-2-1 code it!

Copyrights records by Thomson Delmar Learning



Computer security in the 21st century

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006168657 / 2005-06-08
Date of Publication:
March 29, 2005
Date of Creation:
2005
Title:
Computer security in the 21st century / edited by D. T. Lee, S. P. Shieh, J. D. Tygar.
Imprint:
New York : Springer, c2005.
Description:
268 p.
Number of similar titles:
1
Copyright Claimant:
Springer Science+Business Media, Inc.
Names:
J. D. Tygar
S. P. Shieh
D. T. Lee
Springer Science+Business Media, Inc. (190 documents)
example document: High performance computational science and engineering

Copyrights records by Springer Science+Business Media, Inc.



Computer security fundamentals

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006175633 / 2005-05-06
Date of Publication:
March 3, 2005
Date of Creation:
2004
Title:
Computer security fundamentals.
Copyright Note:
Cataloged from appl. only.
Copyright Claimant:
Pearson Education, Inc.
Names:
Pearson Education, Inc. (6087 documents)
example document: Introduction to AutoCAD 2007

Computer security in the 21st century

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006318487 / 2006-02-17
Date of Publication:
March 29, 2005
Date of Creation:
2005
Title:
Computer security in the 21st century / editor, D. T. Lee.
Copyright Note:
Cataloged from appl. only.
Number of similar titles:
1
Copyright Claimant:
Springer Science+Business Media, Inc. (employer for hire)
Names:
D. T. Lee
Springer Science+Business Media, Inc. (190 documents)
example document: Communication systems

Computer security management

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000147690 / 1984-01-11
Date of Creation:
1983
Title:
Computer security management : Designing, evaluating, and managing a secure computer environment : training curriculum outline / Joel Zimmerman [i.e. Joel S. Zimmerman]
Description:
Sheets.
Number of similar titles:
1
Other Title:
Designing, evaluating, and managing a secure computer environment : training curriculum outline
Copyright Claimant:
Computer Security, Inc.
Names:
Joel S. Zimmerman 1945-
Computer Security, Inc.

Computer security (for TRS 80--models 1 & III)

Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TXu000187489 / 1985-02-15
Date of Creation:
1985
Title:
Computer security (for TRS 80--models 1 & III) : Secure.
Basis of Claim:
New Matter: modifications.
Other Title:
Secure
Copyright Claimant:
John T. LeSueur 2d
Notes:
Cataloged from appl. only.
Authorship on Application:
John T. LeSueur 2d.
Names:
John T. 2d LeSueur 1948-

Computer security

Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TXu000187490 / 1985-02-15
Date of Creation:
1985
Title:
Computer security : Secure.
Number of similar titles:
72
Other Title:
Secure
Copyright Claimant:
John T. LeSueur 2d
Notes:
Cataloged from appl. only.
Authorship on Application:
John Thomas LeSueur 2d.
Names:
John Thomas 2d LeSueur 1948-

Computer security plan data base management system

Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TXu000345581 / 1988-10-20
Date of Creation:
1988
Title:
Computer security plan data base management system.
Description:
1 v. + magnetic disk.
Copyright Claimant:
John W. Long
Authorship on Application:
compilation of data: John W. Long.
Names:
John W. Long 1948-

Computer security, privacy, and contingency planning policy

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000383756 / 1989-09-08
Date of Creation:
1989
Title:
Computer security, privacy, and contingency planning policy / prepared by Boyd Hurst.
Description:
sheets.
Copyright Claimant:
Boyd Hurst
Notes:
At head of ti.: HurstTexas National Bank.
Names:
Boyd Hurst 1928-
HurstTexas National Bank, Abilene, Tex.

Computer security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000411635 / 1990-04-04
Date of Creation:
1989
Title:
Computer security : Protection With a Purpose / presented by Peter Pitorri.
Number of similar titles:
72
Variant title:
Computer security : Protection With a Purpose
Copyright Claimant:
Peter Pitorri
Names:
Peter Pitorri 1938-

Computer security--to provide and protect your critical business information

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000411643 / 1990-04-04
Date of Creation:
1989
Title:
Computer security--to provide and protect your critical business information / Peter Pitorri.
Copyright Claimant:
Peter Pitorri
Names:
Peter Pitorri 1938-

Computer security and software use

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000480939 / 1991-07-25
Date of Creation:
1991
Title:
Computer security and software use : violations of copyright laws.
Description:
sheets.
Copyright Claimant:
Boyd Hurst
Authorship on Application:
Boyd Hurst.
Names:
Boyd Hurst 1928-

Computer security system

Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TXu000504326 / 1992-01-21
Date of Creation:
1992
Title:
Computer security system.
Application Title:
CCS.
Edition:
Version 1.0.
Copyright Claimant:
Jeffrey Kris Slater, 1977-
Notes:
Computer program.
Names:
Jeffrey Kris Slater 1977-

Computer security in the academic community

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000526552 / 1992-07-06
Date of Creation:
1991
Title:
Computer security in the academic community.
Copyright Claimant:
Christopher John O'Reilley, 1965-
Notes:
Thesis.
Names:
Christopher John O'Reilley 1965-

Computer security engineering

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000580107 / 1993-07-20
Date of Creation:
1993
Title:
Computer security engineering : an analysis of fundamental considerations.
Description:
Sheets (147 p.)
Number of similar titles:
1
Copyright Claimant:
Alexander Jameson West, 1947-
Names:
Alexander Jameson West 1947-

This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible. Multiple persons can share the same name.