SECURITY IN COMPUTER COMPLEX

被引:0
|
作者
SCOMA, L
机构
来源
COMPUTERS AND AUTOMATION | 1970年 / 19卷 / 11期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:10 / &
相关论文
共 50 条
  • [31] What is computer security?
    Bishop, Matt
    IEEE Security and Privacy, 2003, 1 (01): : 67 - 69
  • [32] COMPUTER SECURITY ECONOMICS
    ORLANDI, E
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 107 - 111
  • [33] TOWARD COMPUTER SECURITY
    RITTERSBACH, GH
    MANAGEMENT CONTROLS, 1975, 22 (07): : 158 - 165
  • [34] TELECOMMUNICATIONS AND COMPUTER SECURITY
    GUYNES, S
    JOURNAL OF SYSTEMS MANAGEMENT, 1979, 30 (12): : 19 - 23
  • [35] Computer security and statistics
    Solka, JL
    Wegman, EJ
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 45 (01) : 1 - 2
  • [36] OUTLOOK FOR COMPUTER SECURITY
    DIFFIE, W
    MINI-MICRO SYSTEMS, 1978, 11 (10): : 42 - 44
  • [37] COMPUTER PRIVACY AND SECURITY
    CAMPAIGNE, H
    HOFFMAN, LJ
    COMPUTERS AND AUTOMATION, 1973, 22 (07): : 12 - 17
  • [38] COMPUTER SECURITY AND PRIVACY
    HSIAO, DK
    NAVAL RESEARCH REVIEWS, 1978, 31 (01): : 21 - 26
  • [39] Computer network security
    Janson, P
    Rudin, H
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [40] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93