Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties

Type

Book

Title

Security for small computer systems — a practical guide for users

Authors

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I.

Year

1988

Harvard

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I., 1988. Security for small computer systems — a practical guide for users, Computer Law & Security Review. https://doi.org/10.1016/0267-3649(89)90156-8 ISSN: 02673649

IDs

ISBN: 0-946395-50-0

Abstract

This book has been written to help you, the end user of a small computer system,

...

decide whether or not your system is "secure", and if not, what to do about

...

it. Your system may be a stand alone micro-computer or word-processor, a small

...

mini-computer, or any of these connected to a network. You could be using

...

software packages - spread sheets, word-processing, database, accounting etc -

...

or purpose-written software. Whatever you use your system for you have one

...

thing in common with all other computer users - you are storing and processing

...

information. The information may vary in value, but even the most trivial data

...

has a value (even if only the cost of the time taken to enter it), and will need

...

protecting.

()