What people are saying - Write a review
We haven't found any reviews in the usual places.
The Vulnerability of Computers
8 other sections not shown
Other editions - View all
access control acerss activity aftercare alternative application authorised British British Computer Society burglar alarm cent chapter company's computer centre computer complex computer personnel computer room computer security computer system concerned control of access cost counter-espionage crime criminal data bank defence dependence detection developed devices duplicate Early warning electronic ensure equipment example fire brigade fraud function human illegal important increase industrial espionage intrusion Judith Coplon landlines Leon Radzinowicz locking devices loss manufacturers means ment methods operation organisation owner Passive sabotage persons physical police possible principle procedures programming protection punched cards R. V. Jones reason records regular access responsibility risk manager safe secret surveillance security measures security problem society staff Stardust stoange stored subversion subversive political tape technical technique telephone Theft of information threat trade unions unauthorised Vulnerable Point Work-to-rule