MANAGING COMPUTER SECURITY - METHODOLOGY AND POLICY

被引:0
|
作者
ELOFF, JHP
BADENHORST, KP
机构
来源
INFORMATION AGE | 1990年 / 12卷 / 04期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:213 / 216
页数:4
相关论文
共 50 条
  • [31] Managing computer networks security through self-organization: A complex system perspective
    Foukia, N
    Hassas, S
    ENGINEERING SELF-ORGANISING SYSTEMS: NATURE-INSPIRED APPROACHES TO SOFTWARE ENGINEERING, 2004, 2977 : 124 - 138
  • [32] An information flow security policy verification methodology and its application in operating systems
    Yi, XD
    Yang, XJ
    Proceedings of the 11th Joint International Computer Conference, 2005, : 700 - 703
  • [33] METHODOLOGY FOR MANAGING RESOURCES
    KOCH, CT
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 1972, 64 (02): : 122 - &
  • [34] Managing Security Risks
    Abrahamson, Donald W.
    Sepeda, Adrian L.
    CHEMICAL ENGINEERING PROGRESS, 2009, 105 (07) : 41 - 47
  • [35] Managing Laptop Security
    Burnett, Royce D.
    Friedman, Mark
    Rodriguez, Ramon P., Jr.
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2011, 22 (05): : 53 - 61
  • [36] Managing knowledge security
    Ryan, Julie J.C.H.
    VINE, 2006, 36 (02): : 143 - 145
  • [37] Managing organizational security
    Pfleeger, Shari Lawrence
    Trope, Roland L.
    Palmer, Charles. C.
    IEEE SECURITY & PRIVACY, 2007, 5 (03) : 13 - 15
  • [38] Managing intranet security
    Database Network J, 1 (07):
  • [39] Notes on the Evolution of Computer Security Policy in the US Government, 1965-2003
    Warner, Michael
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 8 - 18
  • [40] COMPUTER SECURITY
    MANUEL, T
    ELECTRONICS, 1984, 57 (05): : 121 - 121