SECURITY IN COMPUTER COMPLEX

被引:0
|
作者
SCOMA, L
机构
来源
COMPUTERS AND AUTOMATION | 1970年 / 19卷 / 11期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:10 / &
相关论文
共 50 条
  • [41] COMPUTER SECURITY AND UNIONIZATION
    PRITCHARD, J
    INFORMATION PRIVACY, 1980, 2 (02): : 69 - 74
  • [42] FUTURE OF COMPUTER SECURITY
    PARKER, D
    INFORMATION AGE, 1982, 4 (01): : 15 - 18
  • [43] SECURITY, JUSTICE, + COMPUTER
    WHISENAND, PM
    MEDAK, GM
    DATAMATION, 1971, 17 (12): : 24 - +
  • [44] WHAT IS COMPUTER SECURITY
    WARING, LP
    INFORMATION AGE, 1982, 4 (03): : 142 - 148
  • [45] Computer security in China
    Heinlein, EB
    COMPUTERS & SECURITY, 1996, 15 (05) : 369 - 375
  • [46] Computer languages and security
    Cortesi, A
    Focardi, R
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 1 - 2
  • [47] Computer Security Introduction
    Yost, Jeffrey R.
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 6 - 7
  • [48] COMPUTER SECURITY PRACTICE
    GUYNES, S
    LANEY, MG
    ZANT, R
    JOURNAL OF SYSTEMS MANAGEMENT, 1983, 34 (06): : 22 - 26
  • [49] Computer Security in the Future
    Bishop, Matt
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (01): : 3 - 27
  • [50] MANAGING COMPUTER SECURITY
    FARHOOMAND, AF
    MURPHY, M
    DATAMATION, 1989, 34 (26): : 67 - 68