HPlogo User's Guide to MPE/iX Security: HP 3000 MPE/iX Computer Systems > Chapter 1 Introduction

Security Policy

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. See your system manager for a copy of the current security policy.

Feedback to webmaster