COMPUTER SECURITY

被引:0
|
作者
不详
机构
来源
DUNS BUSINESS MONTH | 1982年 / 120卷 / 06期
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
引用
收藏
页码:94 / &
相关论文
共 50 条
  • [41] Models for computer security
    Bogdanovich, D
    Grusho, AA
    Timonina, EE
    [J]. PROBABILISTIC METHODS IN DISCRETE MATHEMATICS, 2002, : 9 - 21
  • [42] TEACHING COMPUTER SECURITY
    BISHOP, M
    [J]. COMPUTER SECURITY, 1993, 37 : 65 - 74
  • [43] Security of computer networks
    Verschuren, J
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 163 - 185
  • [44] MANAGING COMPUTER SECURITY
    FARHOOMAND, AF
    MURPHY, M
    [J]. DATAMATION, 1989, 34 (26): : 67 - 68
  • [45] COMPUTER SECURITY PRACTICE
    GUYNES, S
    LANEY, MG
    ZANT, R
    [J]. JOURNAL OF SYSTEMS MANAGEMENT, 1983, 34 (06): : 22 - 26
  • [46] Computer Security in the Future
    Bishop, Matt
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (01): : 3 - 27
  • [47] Computer Security Introduction
    Yost, Jeffrey R.
    [J]. IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 6 - 7
  • [48] ASPECTS OF COMPUTER SECURITY
    不详
    [J]. DATA PROCESSING, 1973, 15 (06): : 408 - 410
  • [49] AN OVERVIEW OF COMPUTER SECURITY
    SUMMERS, RC
    [J]. IBM SYSTEMS JOURNAL, 1984, 23 (04) : 309 - 325
  • [50] NIST and Computer Security
    Burr, William
    Ferraiolo, Hildegard
    Waltermire, David
    [J]. IT PROFESSIONAL, 2014, 16 (02) : 31 - 37