Saddington et al., 1988
Type | Book |
---|---|
Title | Security for small computer systems — a practical guide for users |
Authors | Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I. |
Year | 1988 |
Harvard | Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I., 1988. Security for small computer systems — a practical guide for users, Computer Law & Security Review. https://doi.org/10.1016/0267-3649(89)90156-8 ISSN: 02673649 |
IDs | ISBN: 0-946395-50-0 |
Abstract
This book has been written to help you, the end user of a small computer system, decide whether or not your system is "secure", and if not, what to do about it. Your system may be a stand alone micro-computer or word-processor, a small mini-computer, or any of these connected to a network. You could be using software packages - spread sheets, word-processing, database, accounting etc - or purpose-written software. Whatever you use your system for you have one thing in common with all other computer users - you are storing and processing information. The information may vary in value, but even the most trivial data has a value (even if only the cost of the time taken to enter it), and will need protecting.
()
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.