Perspectives in information technology security

被引:0
|
作者
Highland, H.J.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [2] Information technology security
    Elliott, AT
    [J]. NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [3] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [4] Confidentiality and security in information technology
    Lefton, AB
    [J]. GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [5] Standardization in Information Technology Security
    Fal’ O.M.
    [J]. Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [6] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7
  • [7] Security in the Irish Information Technology Sector
    Falk, Courtney
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 52 - 60
  • [8] The global threat to information technology security
    Love, David
    [J]. Software World, 2003, 34 (02):
  • [9] Encrypt and crack technology in information security
    Wang, Da-Kang
    Du, Hai-Shan
    [J]. Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2006, 32 (06): : 497 - 500
  • [10] SECURITY EVALUATION IN INFORMATION TECHNOLOGY STANDARDS
    GENTILE, F
    GIURI, L
    GUIDA, F
    MONTOLIVO, E
    VOLPE, M
    [J]. COMPUTERS & SECURITY, 1994, 13 (08) : 647 - 650