SECURITY IN COMPUTER COMPLEX

被引:0
|
作者
SCOMA, L
机构
来源
COMPUTERS AND AUTOMATION | 1970年 / 19卷 / 11期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:10 / &
相关论文
共 50 条
  • [21] Computer security
    Gollmann, Dieter
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (05): : 544 - 554
  • [22] COMPUTER SECURITY
    FRIEDMAN, H
    RADIO-ELECTRONICS, 1985, 56 (06): : 78 - 79
  • [23] COMPUTER SECURITY
    BRANSTAD, DK
    IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (07) : 10 - 11
  • [24] Energy Security and Economic Development Based on Complex Computer System Dynamic Model
    Li, Tiantian
    Xu, Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [25] Security Metrics Foundations for Computer Security
    Trcek, Denis
    COMPUTER JOURNAL, 2010, 53 (07): : 1106 - 1112
  • [26] COMPUTER SECURITY AND THE LAW
    BIGELOW, RP
    INFOSYSTEMS, 1982, 29 (12): : 84 - 84
  • [27] Journal of Computer Security
    Bella, Giampaolo
    Ryan, Peter
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (03) : 237 - 237
  • [28] COMPUTER SECURITY AND IBM
    TUCHMAN, WL
    SCIENCE, 1977, 197 (4307) : 938 - 938
  • [29] Useful computer security
    Churchill, Elizabeth
    Nelson, Les
    Smetters, Diana K.
    IEEE INTERNET COMPUTING, 2008, 12 (03) : 10 - 12
  • [30] Introduction to computer security
    De Decker, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 377 - 393