Saddington et al., 1988

Type

Book

Title

Security for small computer systems — a practical guide for users

Authors

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I.

Year

1988

Harvard

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I., 1988. Security for small computer systems — a practical guide for users, Computer Law & Security Review. https://doi.org/10.1016/0267-3649(89)90156-8 ISSN: 02673649

IDs

ISBN: 0-946395-50-0

Abstract

This book has been written to help you, the end user of a small computer system, decide whether or not your system is "secure", and if not, what to do about it. Your system may be a stand alone micro-computer or word-processor, a small mini-computer, or any of these connected to a network. You could be using software packages - spread sheets, word-processing, database, accounting etc - or purpose-written software. Whatever you use your system for you have one thing in common with all other computer users - you are storing and processing information. The information may vary in value, but even the most trivial data has a value (even if only the cost of the time taken to enter it), and will need protecting.

()


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.