Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas othe
Cryptography --- Computer security --- Copyright --- History. --- Literary property --- Property, Literary --- Intangible property --- Intellectual property --- Anti-copyright movement --- Authors and publishers --- Book registration, National --- Patent laws and legislation --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Law and legislation --- Protection --- Security measures
Listing 1 - 1 of 1 |
Sort by
|