PREVENTING UNAUTHORIZED ENTRY

被引:0
|
作者
COHN, BM [1 ]
机构
[1] GAGE BABCOCK & ASSOCIATES,ELMHURST,IL
来源
SPECIFYING ENGINEER | 1985年 / 53卷 / 06期
关键词
D O I
暂无
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
引用
收藏
页码:92 / 96
页数:5
相关论文
共 50 条
  • [1] Preventing unauthorized entry
    Rachel David
    [J]. Nature Reviews Molecular Cell Biology, 2012, 13 : 539 - 539
  • [2] TELOMERES Preventing unauthorized entry
    David, Rachel
    [J]. NATURE REVIEWS MOLECULAR CELL BIOLOGY, 2012, 13 (09) : 539 - 539
  • [3] PREVENTING UNAUTHORIZED USE OF SYSTEMS
    MEISSNER, P
    [J]. DATA PROCESSING, 1977, 19 (07): : 42 - 43
  • [4] Preventing Unauthorized Data Flows
    Uzun, Emre
    Parlato, Gennaro
    Atluri, Vijayalakshmi
    Ferrara, Anna Lisa
    Vaidya, Jaideep
    Sural, Shamik
    Lorenzi, David
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 41 - 62
  • [5] Methods for preventing unauthorized software distribution
    Peyravian, M
    Roginsky, A
    Zunic, N
    [J]. COMPUTERS & SECURITY, 2003, 22 (04) : 316 - 321
  • [6] Preventing Unauthorized Access on Passive Tags
    Ding, Han
    Han, Jinsong
    Zhang, Yanyong
    Xiao, Fu
    Xi, Wei
    Wang, Ge
    Jiang, Zhiping
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1115 - 1123
  • [7] PREVENTING UNAUTHORIZED ACCESS + DESIGNING FOR SECURITY
    ANDERSON, DL
    MCGOWAN, MT
    HUNT, JA
    [J]. PROGRESSIVE ARCHITECTURE, 1987, 68 (03): : 144 - +
  • [8] TECHNIQUES IN PREVENTING THE UNAUTHORIZED PRACTICE OF THE LAW
    Maxwell, David F.
    [J]. IOWA LAW REVIEW, 1946, 31 (03) : 301 - 313
  • [9] Preventing unauthorized access in information centric networking
    AbdAllah, Eslam G.
    Zulkernine, Mohammad
    Hassanein, Hossam S.
    [J]. SECURITY AND PRIVACY, 2018, 1 (04):
  • [10] PREVENTING UNAUTHORIZED ACCESS TO NARCOTICS IN THE OPERATING-ROOM
    PARTRIDGE, BL
    WEINGER, MB
    SANFORD, TJ
    [J]. ANESTHESIA AND ANALGESIA, 1990, 71 (05): : 566 - 567