How computer security works

被引:0
|
作者
机构
来源
Scientific American | 1998年 / 279卷 / 04期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Computer security
    Gollmann, Dieter
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (05): : 544 - 554
  • [42] COMPUTER SECURITY
    FRIEDMAN, H
    RADIO-ELECTRONICS, 1985, 56 (06): : 78 - 79
  • [43] COMPUTER SECURITY
    BRANSTAD, DK
    IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (07) : 10 - 11
  • [44] FMS IN THE COMPUTER WORKS
    BERGSTROM, RP
    MANUFACTURING ENGINEERING, 1988, 100 (03): : 85 - 85
  • [45] HOW IT WORKS
    Reed, Kit
    YALE REVIEW, 2012, 100 (03): : 152 - 166
  • [46] HOW IT WORKS
    PECORARO, CA
    INSTRUMENTATION TECHNOLOGY, 1982, 29 (01): : 39 - 40
  • [47] How it works
    Boureston, Jack
    Ferguson, Charles D.
    BULLETIN OF THE ATOMIC SCIENTISTS, 2005, 61 (02) : 16 - 16
  • [48] How it works
    Franson, K. L.
    Cohen, A. F.
    BRITISH JOURNAL OF CLINICAL PHARMACOLOGY, 2009, 68 (03) : 315 - 317
  • [49] HOW IT WORKS
    Colvin, Geoff
    FORTUNE, 2012, 165 (03) : 70 - 79
  • [50] THE COMPUTER IN THE DYE WORKS
    HORSTMANN, G
    MELLIAND TEXTILBERICHTE INTERNATIONAL TEXTILE REPORTS, 1982, 63 (07): : 508 - 508