Computer security?

被引:0
|
作者
Needham, R
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:319 / 326
页数:8
相关论文
共 50 条
  • [31] COMPUTER SECURITY AND PRIVACY
    HSIAO, DK
    [J]. NAVAL RESEARCH REVIEWS, 1978, 31 (01): : 21 - 26
  • [32] TELECOMMUNICATIONS AND COMPUTER SECURITY
    GUYNES, S
    [J]. JOURNAL OF SYSTEMS MANAGEMENT, 1979, 30 (12): : 19 - 23
  • [33] Computer network security
    Janson, P
    Rudin, H
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [34] SECURITY, JUSTICE, + COMPUTER
    WHISENAND, PM
    MEDAK, GM
    [J]. DATAMATION, 1971, 17 (12): : 24 - +
  • [35] Computer security in China
    Heinlein, EB
    [J]. COMPUTERS & SECURITY, 1996, 15 (05) : 369 - 375
  • [36] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
  • [37] FUTURE OF COMPUTER SECURITY
    PARKER, D
    [J]. INFORMATION AGE, 1982, 4 (01): : 15 - 18
  • [38] WHAT IS COMPUTER SECURITY
    WARING, LP
    [J]. INFORMATION AGE, 1982, 4 (03): : 142 - 148
  • [39] COMPUTER SECURITY AND UNIONIZATION
    PRITCHARD, J
    [J]. INFORMATION PRIVACY, 1980, 2 (02): : 69 - 74
  • [40] Computer languages and security
    Cortesi, A
    Focardi, R
    [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 1 - 2