System Security
154
Abstract
Considers various ways of maintaining the confidentiality and integrity of information stored in computer. Discusses key lock mechanisms, shell systems, file encryption, command line protection, file hiding systems, and password selection.
Keywords
Citation
Rowcliffe, G. (1989), "System Security", OCLC Micro, Vol. 5 No. 1, pp. 22-23. https://doi.org/10.1108/EUM0000000003560
Publisher
:MCB UP Ltd
Copyright © 1989, MCB UP Limited