Computer security?

被引:0
|
作者
Needham, R
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:319 / 326
页数:8
相关论文
共 50 条
  • [41] Models for computer security
    Bogdanovich, D
    Grusho, AA
    Timonina, EE
    [J]. PROBABILISTIC METHODS IN DISCRETE MATHEMATICS, 2002, : 9 - 21
  • [42] Security of computer networks
    Verschuren, J
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 163 - 185
  • [43] TEACHING COMPUTER SECURITY
    BISHOP, M
    [J]. COMPUTER SECURITY, 1993, 37 : 65 - 74
  • [44] Computer Security Introduction
    Yost, Jeffrey R.
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 6 - 7
  • [45] MANAGING COMPUTER SECURITY
    FARHOOMAND, AF
    MURPHY, M
    [J]. DATAMATION, 1989, 34 (26): : 67 - 68
  • [46] COMPUTER SECURITY PRACTICE
    GUYNES, S
    LANEY, MG
    ZANT, R
    [J]. JOURNAL OF SYSTEMS MANAGEMENT, 1983, 34 (06): : 22 - 26
  • [47] Computer Security in the Future
    Bishop, Matt
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (01): : 3 - 27
  • [48] DOSSIER - COMPUTER SECURITY
    BERGANTINE, F
    [J]. RECHERCHE, 1983, 14 (143): : 499 - 507
  • [49] NIST and Computer Security
    Burr, William
    Ferraiolo, Hildegard
    Waltermire, David
    [J]. IT PROFESSIONAL, 2014, 16 (02) : 31 - 37
  • [50] ASPECTS OF COMPUTER SECURITY
    不详
    [J]. DATA PROCESSING, 1973, 15 (06): : 408 - 410