Narrow your search

Library

KU Leuven (5)

VUB (5)

UAntwerpen (3)

UCLouvain (1)

ULB (1)

UNamur (1)

Vlerick Business School (1)


Resource type

book (5)


Language

English (5)


Year
From To Submit

1984 (1)

1981 (1)

1979 (1)

1977 (1)

1973 (1)

Listing 1 - 5 of 5
Sort by

Book
The Data processing security game : safeguarding against the real dangers of computer abuse
Author:
ISBN: 0080217907 132255675X 1483188183 Year: 1977 Publisher: Elmsford, New York : Pergamon Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is the


Book
Computer security : a global challenge : proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10-12 September, 1984

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security and privacy in computer systems
Author:
ISBN: 0471406112 9780471406112 Year: 1973 Publisher: Los Angeles, Calif. Melville

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer. Automation --- Electronic data processing departments --- Privacy, Right of --- Informatique, Centres d' --- Droit à la vie privée --- Security measures --- Sûreté --- Mesures --- AA / International- internationaal --- 654 --- -338.043 --- #TCPW P4.0 --- #TCPW P4.8 --- 681.3*D46 --- 681.3*K41 --- 681.3*K62 --- 681.3*K6m --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Computer centers --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K41 --- Installation management: benchmarks; computer selection; pricing and resourceallocation; computing equipment management; performance and usage measurement(Management of computing and information systems) --- Insurance; security (Management of computing and information systems) --- Law and legislation --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*K62 Installation management: benchmarks; computer selection; pricing and resourceallocation; computing equipment management; performance and usage measurement(Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Droit à la vie privée --- Sûreté --- 338.043 --- Computer department security measures --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- Electronic data processing departments - Security measures

Listing 1 - 5 of 5
Sort by