LexingtonBooks, 1984 - Centres de traitement de l'information - Sūreté - Mesures - 166 pages
Hardware constituents; Software and systems constituents; Protective procedure-based techniques; protective hardware technology; Protective software technology; Evaluating security technology.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Software and System Constituents
11 other sections not shown
activity addition allow analysis applications Associates audit authorized automatic basic bits called cards central changes ciphertext circuit CIRCULAR SHIFT communication computer security computer system computer-security connection Corp cost depends designed detection developed devices effective electrical electronic encryption energy equipment example facility figure fire frequency functions Group Halon hardware identified important input intended International less lines locations logic loss magnetic measures memory method monitoring multiplexing Office operating system output passwords performance person personnel physical port possible prevent problems procedures Products protection puter range records relatively response result risk satellite selected Services signal similar Standards storage tape technique telephone terminal tion transformation transmission typically unauthorized unit users usually wiring write