A Study of Computer Based Data Security Techniques.
NAVAL POSTGRADUATE SCHOOL MONTEREY CALIF
Pagination or Media Count:
The report presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning security techniques and with a tool to evaluate the data and select the techniques applicable to their respective security requirements. Author
- Computer Programming and Software
- Computer Systems Management and Standards