August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies