COMPUTER SECURITY

被引:0
|
作者
RUDALL, BH [1 ]
机构
[1] UNIV COLL N WALES, BANGOR LL57 2ND, GWYNEDD, WALES
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:6 / 8
页数:3
相关论文
共 50 条
  • [41] WHAT IS COMPUTER SECURITY
    WARING, LP
    INFORMATION AGE, 1982, 4 (03): : 142 - 148
  • [42] Computer languages and security
    Cortesi, A
    Focardi, R
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 1 - 2
  • [43] COMPUTER SECURITY PRACTICE
    GUYNES, S
    LANEY, MG
    ZANT, R
    JOURNAL OF SYSTEMS MANAGEMENT, 1983, 34 (06): : 22 - 26
  • [44] Computer Security in the Future
    Bishop, Matt
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (01): : 3 - 27
  • [45] MANAGING COMPUTER SECURITY
    FARHOOMAND, AF
    MURPHY, M
    DATAMATION, 1989, 34 (26): : 67 - 68
  • [46] Computer Security Introduction
    Yost, Jeffrey R.
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2015, 37 (02) : 6 - 7
  • [47] TEACHING COMPUTER SECURITY
    BISHOP, M
    COMPUTER SECURITY, 1993, 37 : 65 - 74
  • [48] Security of computer networks
    Verschuren, J
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 163 - 185
  • [49] Models for computer security
    Bogdanovich, D
    Grusho, AA
    Timonina, EE
    PROBABILISTIC METHODS IN DISCRETE MATHEMATICS, 2002, : 9 - 21
  • [50] AN OVERVIEW OF COMPUTER SECURITY
    SUMMERS, RC
    IBM SYSTEMS JOURNAL, 1984, 23 (04) : 309 - 325