What people are saying - Write a review
We haven't found any reviews in the usual places.
The Vulnerability of Computers
8 other sections not shown
Other editions - View all
access control activities aftercare alternative application associated authorised burglar alarm cent chapter Chubb company's computer centre computer complex computer personnel computer room computer security computer system concerned Contesl control of access cost counter-espionage crime criminal Criminology data bank defence dependence detection developed devices duplicate Early warning electronic ensure equipment example fire brigade Fire Protection fraud function highly human illegal important increase industrial espionage installations intrusion Judith Coplon landlines Leon Radzinowicz locking devices loss manufacturers means ment million operation organisation owner Passive sabotage persons physical police possible principle programming punched cards purpose R. V. Jones reason records regular access responsibility risk management safe secret surveillance security measures security problem society staff Stardust storage stored subversion subversive political tape technical technique telephone threat trade unions unauthorised Vulnerable Point Work-to-rule