Computer security. (Understanding computers) TX 1-836-382 (1986) & TX 2-068-805 (1987)
Computer security techniques
Document number:
V2189P286
Date of Recordation:
June 16, 1986
Entire Copyright Document:
V2189 P274-292
Registration Number Not Verified:
PA 94-726 (1981)
Title:
Computer security techniques / PA 94-726 (1981)
Number of similar titles:
2
Title appears in Document:
Taking a Deltak course & 327 other titles. (Part 002 of 002)
Computer security and protection structures
Document number:
V1816P077
Date of Recordation:
November 3, 1980
Entire Copyright Document:
V1816 P64-81
Registration Number Not Verified:
A844895 (1977)
Title:
Computer security and protection structures / Editors: Bruce J. Walker & Ian F. Blake. A844895 (1977)
Title appears in Document:
Cyclic nucleotides and the regulation of cell growth & 262 other titles. (Part 002 of 002)
Computer security techniques
Document number:
V2318P287
Date of Recordation:
November 23, 1987
Entire Copyright Document:
V3189 P273-294
Registration Number Not Verified:
PA 94-726 (1981)
Title:
Computer security techniques / PA 94-726 (1981)
Number of similar titles:
2
Title appears in Document:
Taking a Deltak course & 350 other titles.
Computer security basics
Document number:
V3513D728
Date of Recordation:
August 4, 2004
Entire Copyright Document:
V3513 D727-729 P1-156
Registration Number Not Verified:
TX 3-374-503 (1992)
Title:
Computer security basics / By Deborah Russell & G. T. Gangemi, Sr. DCR 1991. TX 3-374-503 (1992)
Number of similar titles:
5
Title appears in Document:
UNIX text processing & 562 other titles. (Part 002 of 002)
Computer security for Dummies
Document number:
V3439D436
Date of Recordation:
August 3, 1999
Entire Copyright Document:
V3439 D436 P1-24
Registration Number Not Verified:
TX 4-326-011 (1996)
Title:
Computer security for Dummies / By Peter T. Davis. TX 4-326-011 (1996)
Title appears in Document:
AmigaWorld official Amiga DOS 2 companion & 1,433 other titles; books & cliff notes.
Computer security basics
Document number:
V3506D020
Date of Recordation:
November 28, 2003
Entire Copyright Document:
V3506 D020-021 P1-109
Registration Number Not Verified:
TX 3-374-503 (1992)
Title:
Computer security basics / By Deborah Russell & G. T. Gangemi. DCR 1991. TX 3-374-503 (1992)
Number of similar titles:
5
Title appears in Document:
UNIX text processing & 476 other titles. (Part 001 of 002)
Computer security basics
Document number:
V3513D727
Date of Recordation:
August 4, 2004
Entire Copyright Document:
V3513 D727-729 P1-156
Registration Number Not Verified:
TX 3-374-503 (1992)
Title:
Computer security basics / By Deborah Russell & G. T. Gangemi, Sr. DCR 1991. TX 3-374-503 (1992)
Number of similar titles:
5
Title appears in Document:
UNIX text processing & 562 other titles. (Part 001 of 002)
Computer security awareness. No. 1-963-425 (1986)
Document number:
V3445D680
Date of Recordation:
December 14, 1999
Entire Copyright Document:
V3445 D680 P1-18
Title:
Computer security awareness. No. 1-963-425 (1986)
Variant title:
Computer security awareness
Title appears in Document:
3270 training (added student handbook) & 152 other titles.
Computer security basics
Document number:
V3509D231
Date of Recordation:
February 25, 2004
Entire Copyright Document:
V3509 D231-233 P1-167
Registration Number Not Verified:
TX 3-374-503 (1992)
Title:
Computer security basics / By Deborah Russell & G. T. Gangemi, Sr. DCR 1991. TX 3-374-503 (1992)
Number of similar titles:
5
Title appears in Document:
UNIX text processing & 553 other titles. (Part 001 of 002)
Computer security. (Understanding computers) TX 1-836-382 (1986) & TX 2-068-805 (1987)
Document number:
V3525D898
Date of Recordation:
June 30, 2005
Entire Copyright Document:
V3525 D890-898 P1-77
Registration Number Not Verified:
TX 2-068-805 (1987)
TX 1-836-382 (1986)
TX 1-836-382 (1986)
Title:
Computer security. (Understanding computers) TX 1-836-382 (1986) & TX 2-068-805 (1987)
Variant title:
Understanding computers
Title appears in Document:
52 easy weekend home improvements & 1775 other titles (part 009 of 009)
Computer security. (Understanding computers) TX 1-838-862 (1986) & TX 2-068-805 (1987)
Document number:
V3527D008
Date of Recordation:
June 28, 2005
Entire Copyright Document:
V3527 D1-9 P1-78
Registration Number Not Verified:
TX 2-068-805 (1987)
TX 1-838-862 (1986)
TX 1-838-862 (1986)
Title:
Computer security. (Understanding computers) TX 1-838-862 (1986) & TX 2-068-805 (1987)
Variant title:
Understanding computers
Title appears in Document:
52 easy weekend home improvements & 1778 other titles (part 008 of 009)
Computer security techniques
Type of Work:
Multimedia kit
Registration Number / Date:
PA0000094726 / 1981-01-06
Date of Publication:
October 24, 1980
Date of Creation:
1980
Title:
Computer security techniques : [no.] 81-61X.
Copyright Note:
C.O. correspondence.
Imprint:
[s.l.] : Deltak, c1980.
Description:
3 videocassettes, 3 study guides, in 3 containers.
Number of similar titles:
2
Variant title:
Computer security techniques : [no.] 81-61X
Copyright Claimant:
Deltak, Inc.
Notes:
Deposit includes description (2 p.)
Authorship on Application:
Deltak, Inc., employer for hire.
Names:
Deltak, Inc. (121 documents)
example document: Advanced program control
example document: Advanced program control
|
Computer security guide for financial institutions
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0000347441 / 1979-10-11
Date of Publication:
May 8, 1979
Date of Creation:
1978
Title:
Computer security guide for financial institutions.
Imprint:
Washington, D. C. : Insurance and Protection Div., American Bankers Association, c1978.
Description:
74 p.
Copyright Claimant:
American Bankers Association
Names:
American Bankers Association (780 documents)
example document: Economics
example document: Economics
|
Computer security manual
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0000484284 / 1980-02-11
Date of Publication:
February 23, 1978
Date of Creation:
1978
Title:
Computer security manual.
Copyright Note:
C.O. correspondence.
Imprint:
Hudson, Mass. : The Institute, c1978.
Description:
1 v.
Number of similar titles:
1
Copyright Claimant:
Computer Security Institute, Inc.
Names:
Computer Security Institute, Inc.
Computer security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0000570200 / 1980-10-16
Date of Publication:
August 21, 1980
Date of Creation:
1979
Title:
Computer security : a management audit approach / Norman L. Enger, Paul W. Howerton [i.e. Paul William Howerton].
Imprint:
New York : Amacom, c1980.
Description:
264 p.
Number of similar titles:
72
Similar Title:
Copyright Claimant:
Amacom, a division of American Management Associations
Names:
Paul William Howerton 1916-
American Management Associations. Amacom (276 documents)
example document: Product liability
Amacom, a division of American Management Associations. (131 documents)
example document: Creative problem solving
American Management Associations. Amacom (276 documents)
example document: Product liability
|
Amacom, a division of American Management Associations. (131 documents)
example document: Creative problem solving
|
Computer security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0000712020 / 1981-06-08
Date of Publication:
July 10, 1979
Date of Creation:
1979
Title:
Computer security / David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick.
Imprint:
New York : Academic Press, 1979.
Description:
299 p.
Number of similar titles:
72
Copyright Claimant:
Academic Press, Inc.
Names:
Stuart E. Madnick 1944-
Douglas S. Kerr 1940-
David K. Hsiao 1933-
Academic Press, Inc. (4596 documents)
example document: Food and natural resources
Douglas S. Kerr 1940-
David K. Hsiao 1933-
Academic Press, Inc. (4596 documents)
example document: Food and natural resources
|
Computer security management
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001343846 / 1983-12-08
Date of Publication:
March 11, 1981
Date of Creation:
1980
Title:
Computer security management / Donn B. Parker.
Copyright Note:
C.O. correspondence.
Imprint:
Reston, Va. : Reston Pub. Co., c1981.
Description:
308 p.
Number of similar titles:
1
Copyright Claimant:
Reston Publishing Company, Inc.
Names:
Donn B. Parker
Reston Publishing Company, Inc. (780 documents)
example document: An introduction to electric circuits (AC and DC)
|
Reston Publishing Company, Inc. (780 documents)
example document: An introduction to electric circuits (AC and DC)
|
Computer security--hardware, software, systems and facilities markets
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001463913 / 1984-12-07
Date of Publication:
October 1, 1984
Date of Creation:
1984
Title:
Computer security--hardware, software, systems and facilities markets : report no. 623.
Description:
228 p.
Copyright Claimant:
International Resource Development, Inc.
Names:
International Resource Development, Inc.
|
Computer security guidelines
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001601039 / 1985-06-19
Date of Publication:
June 1, 1984
Date of Creation:
1984
Title:
Computer security guidelines.
Copyright Claimant:
New York Life Insurance Company
Notes:
Cataloged from appl.
Names:
New York Life Insurance Company (15 documents)
example document: Generations
example document: Generations
|
Computer security (let's talk about it)
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001608971 / 1985-07-16
Date of Publication:
May 5, 1985
Date of Creation:
1985
Title:
Computer security (let's talk about it)
Copyright Claimant:
Corporation of the President of the Church of Jesus Christ of Latter-day Saints
Notes:
Cataloged from appl.
Names:
Corporation of the President of the Church of Jesus Christ of Latter-day Saints (344 documents)
example document: Nebraska
example document: Nebraska
|
Computer security handbook
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001809694 / 1986-05-06
Date of Publication:
February 28, 1986
Date of Creation:
1985
Title:
Computer security handbook : strategies and techniques for preventing data loss or theft / Rolf T. Moulton.
Imprint:
Englewood Cliffs, N. J. : Prentice-Hall, c1986.
Description:
246 p.
Number of similar titles:
3
Copyright Claimant:
Prentice-Hall, Inc.
Names:
Rolf T. Moulton
Prentice-Hall, Inc. (10761 documents)
example document: Prentice Hall literature
Prentice-Hall, Inc. (10761 documents)
example document: Prentice Hall literature
|
Computer security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002068805 / 1987-03-13
TX0001838882 / 1986-06-09
TX0001838882 / 1986-06-09
Date of Publication:
May 23, 1986
Date of Creation:
1986
Title:
Computer security / by the editors of Time-Life Books.
Basis of Claim:
New Matter: "illustrations, original text, photographic compilation, original photographs and artwork."
Previous Registration:
Prev. reg.
Copyright Note:
See also Computer security; Reg. 13Mar87; TX 2-068-805
Series:
Understanding computers
Imprint:
Alexandria, Va. : Time-Life Books, c1986.
Description:
128 p.
Number of similar titles:
72
Copyright Claimant:
Time-Life Books, Inc.
Names:
Time-Life Books, Inc. (432 documents)
example document: The World we live in. By the editorial staff of Life and Lincoln Barnett
example document: The World we live in. By the editorial staff of Life and Lincoln Barnett
|
Computer security awareness
Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TX0001963425 / 1986-11-12
Date of Publication:
November 4, 1986
Date of Creation:
1986
Title:
Computer security awareness.
Description:
sheets + printout.
Number of similar titles:
4
Copyright Claimant:
D P E C, Inc.
Names:
DPEC, Inc. (138 documents)
example document: Administering and managing MS exchange server
example document: Administering and managing MS exchange server
|
Computer security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002035721 / 1987-03-31
Date of Publication:
February 25, 1987
Date of Creation:
1986
Title:
Computer security / John M. Carroll.
Edition:
2nd ed.
Basis of Claim:
New Matter: updated text & added material.
Imprint:
Boston : Butterworths, c1987.
Description:
446 p.
Number of similar titles:
72
Copyright Claimant:
Butterworth Publishers
Names:
John Millar Carroll (8 documents)
example document: Marking time
Butterworth Publishers (202 documents)
example document: Image clarity
example document: Marking time
|
Butterworth Publishers (202 documents)
example document: Image clarity
|
Computer security awareness
Type of Work:
Machine-readable work or computer program
Registration Number / Date:
TX0002053022 / 1987-04-09
Date of Publication:
April 3, 1987
Date of Creation:
1987
Title:
Computer security awareness.
Basis of Claim:
New Matter: "additional text."
Previous Registration:
Prev. reg. 1986, TX 1-963-425.
Description:
printout + sheets.
Number of similar titles:
4
Copyright Claimant:
D P E C, Inc.
Names:
Computer security. By Time-Life Books, Inc. (Understanding computers)
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001838882 / 1986
TX0002068805 / 1987-03-13
TX0002068805 / 1987-03-13
Title:
Computer security. By Time-Life Books, Inc. (Understanding computers)
Previous Registration:
(on original appl.: Prev. reg.)
Supplement to Registration:
TX 1-838-882, 1986
Variant title:
Computer security
Other Title:
Understanding computers
Copyright Claimant:
Time-Life Books, Inc.
Notes:
C.O. corres.
Names:
Computer security markets
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002133405 / 1987-05-26
Date of Publication:
April 1, 1987
Date of Creation:
1987
Title:
Computer security markets : report no. 731.
Copyright Note:
C.O. correspondence.
Description:
163 p.
Copyright Claimant:
International Resource Development, Inc.
Names:
International Resource Development, Inc.
Computer security
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002356694 / 1987-01-07
Date of Publication:
December 15, 1986
Date of Creation:
1986
Title:
Computer security : readings from Security management magazine / edited by Shari Mendelson Gallery.
Basis of Claim:
New Matter: "editing of material; compilation of articles; text of introduction and part introductions."
Copyright Note:
C.O. correspondence.
Imprint:
Boston : Butterworths, c1987.
Description:
301 p.
Number of similar titles:
72
Copyright Claimant:
Butterworth Publishers
Names:
Shari Mendelson Gallery
Butterworth Publishers (202 documents)
example document: The social scientist's bestiary
|
Butterworth Publishers (202 documents)
example document: The social scientist's bestiary
Computer security and resulting goods and services
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002473959 / 1989-01-09
Date of Publication:
October 1, 1986
Date of Creation:
1986
Title:
Computer security and resulting goods and services / Sam Diamond, project analyst.
Series:
Business opportunity report ;
Imprint:
Stamford, Conn. : Business Communications Co., 1986.
Description:
83 p.
Other Title:
Business opportunity report ; G-083
Copyright Claimant:
Business Communications Company
Authorship on Application:
entire text: Business Communications Company, Inc., employer for hire.
Names:
Sam Diamond
Business Communications Company, Inc. (509 documents)
example document: Air pollution and the market for monitors and sensors
Business Communications Company, Inc. (509 documents)
example document: Air pollution and the market for monitors and sensors
|
Computer security and programming ethics
Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0002512921 / 1989-02-17
Date of Publication:
February 3, 1989
Date of Creation:
1989
Title:
Computer security and programming ethics : PG109 ; Computer numbering systems : PG110.
Imprint:
Washington, D. C. : McGraw-Hill Continuing Education Center, c1989.
Description:
2 v. in 1.
Other Title:
Computer numbering systems
Copyright Claimant:
McGraw-Hill Continuing Education Center (a.k.a. N R I)
Names:
McGraw-Hill Continuing Education Center. National Radio Institute (503 documents)
example document: Electronic instruments ; Music theory and notation
NRI. (142 documents)
example document: Electronic music technology: MU100
example document: Electronic instruments ; Music theory and notation
|
NRI. (142 documents)
example document: Electronic music technology: MU100
|
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible. Multiple persons can share the same name.