INFORMATION SECURITY IN A COMPUTER ENVIRONMENT

被引:0
作者
VANTASSEL, D
机构
来源
COMPUTERS AND AUTOMATION | 1969年 / 18卷 / 08期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:24 / +
页数:1
相关论文
共 50 条
[41]   Information security in an E-learning environment [J].
Kritzinger, E. .
Education for the 21st Century - Impact of ICT and Digital Resources, 2006, 210 :345-349
[42]   Development of ISEE: An Information Security Engineering Environment [J].
Cheng, Jingde ;
Goto, Yuichi ;
Horie, Daisuke ;
Miura, Junichi ;
Kasahara, Toshio ;
Iqbal, Ahmad .
2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, :505-510
[43]   Teaching computer security using Xen in a virtual environment [J].
Hu, Dong ;
Wang, YuYan .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :389-392
[44]   Security analysis of fog computing environment for ensuring the security and privacy of information [J].
Gola, Kamal Kumar ;
Arya, Shikha ;
Khan, Gulista ;
Devkar, Chetna ;
Chaurasia, Nishant .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (10)
[45]   HOW PEOPLE FIND INFORMATION IN A COMPUTER ENVIRONMENT [J].
BAGGETT, P ;
EHRENFEUCHT, A .
BULLETIN OF THE PSYCHONOMIC SOCIETY, 1985, 23 (04) :289-289
[46]   Computer Teaching Development Based on Information Environment [J].
Hou, Yan .
PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 :94-97
[47]   Computer forensics, information security and law: A case study [J].
Herath, A ;
Herath, S ;
Samarasinghe, P ;
Herath, J ;
Herath, S .
FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, :135-141
[48]   The security and protection strategy research of computer network information [J].
Liu, Yu ;
Chang, Jing .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 :95-99
[49]   Propose an educational plan for computer ethics and information security [J].
Taherdoost, Hamed ;
Sahibuddin, Shamsul ;
Namayandeh, Meysam ;
Jalaliyoon, Neda .
WORLD CONFERENCE ON EDUCATIONAL TECHNOLOGY RESEARCHES-2011, 2011, 28
[50]   Application of Computer Information Encryption Technology in Network Security [J].
Aimait, Aikebaier Jiang .
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, :32-34