Previous Chapter: C Emergency Response Teams
Suggested Citation: "D Models for GSSP." National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/1581.
Page 278
Suggested Citation: "D Models for GSSP." National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/1581.
Page 279
Suggested Citation: "D Models for GSSP." National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/1581.
Page 280
Suggested Citation: "D Models for GSSP." National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/1581.
Page 281
Suggested Citation: "D Models for GSSP." National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/1581.
Page 282
Next Chapter: E High-grade Threats
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.