Information technology security

被引:0
|
作者
Elliott, AT [1 ]
机构
[1] Univ Glasgow, Western Infirm, Glasgow G11 6NT, Lanark, Scotland
关键词
D O I
10.1097/00006231-200312000-00001
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
引用
收藏
页码:1205 / 1205
页数:1
相关论文
共 50 条
  • [1] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [2] Confidentiality and security in information technology
    Lefton, AB
    GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [3] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [4] Standardization in Information Technology Security
    Fal’ O.M.
    Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [5] Perspectives in information technology security
    Highland, H.J.
    Proceedings of the IFIP World Computer Congress, 1992, 2
  • [6] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7
  • [7] Security in the Irish Information Technology Sector
    Falk, Courtney
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 52 - 60
  • [8] SECURITY EVALUATION IN INFORMATION TECHNOLOGY STANDARDS
    GENTILE, F
    GIURI, L
    GUIDA, F
    MONTOLIVO, E
    VOLPE, M
    COMPUTERS & SECURITY, 1994, 13 (08) : 647 - 650
  • [9] The global threat to information technology security
    Love, David
    Software World, 2003, 34 (02):
  • [10] Encrypt and crack technology in information security
    Wang, Da-Kang
    Du, Hai-Shan
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2006, 32 (06): : 497 - 500