What people are saying - Write a review
We haven't found any reviews in the usual places.
The Vulnerability of Computers
8 other sections not shown
Other editions - View all
access control activities application associated authorised British Computer Society British Security Industry burglar alarm cent chapter Chubb company's computer centre computer complex computer personnel computer room computer security computer system concerned control of access cost counter-espionage crime criminal Criminology damage data bank defence dependence detection developed devices director duplicate Early warning electronic ensure equipment example fire brigade Fire Protection fraud function human illegal important increase industrial espionage installations intrusion Judith Coplon landlines Leon Radzinowicz locking devices London loss means ment million operation organisation owner persons physical police possible principle programming punched cards purpose R. V. Jones reason records regular access responsibility risk management sabotage safe secret surveillance security measures society staff Stardust stored stosge subversion subversive political tape technical technique telephone threat trade unions unauthorised Vulnerable Point Work-to-rule