Within the last year
Within the past 3 years
1 - 4 of 4 articles
The computer resides in an environment which has a critical impact on its continual operation and availability. This environment has several key control elements including, temperature and humidity controls, power supply controls, working space control, fire protection systems, and physical...
The Statistical Collection File (SCF) contains data which can be used to detect unauthorized computer use. This paper gives examples of which record types to capture and how to extract and report this information using DEAR, GSEP and microfiche.
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.