Computer-security Technology

Front Cover
Hardware constituents; Software and systems constituents; Protective procedure-based techniques; protective hardware technology; Protective software technology; Evaluating security technology.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Introduction
1
Hardware Constituents
7
Software and System Constituents
27
Copyright

11 other sections not shown

Common terms and phrases

Bibliographic information