Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("FILE PROTECTION")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 100

  • Page / 4
Export

Selection :

  • and

PRIVACY, SECURITY AND RESPONSIBILITY.BENJAMIN AA.1978; IN: TRANSNATL DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES LTD; DA. 1978; PP. 1-8Conference Paper

SECURITY IN A STATISTICAL DATA BASEMOHAMMED INAM ULHAQ.1974; IN: INF. UTIL. PROC. 37TH. ASIS ANNU. MEET. XI; ATLANTA, GA.; 1974; WASHINGTON, D.C.; AM. SOC. INF. SCI.; DA. 1974; PP. 33-39; BIBL. 11REF.Conference Paper

INSTALLING SECURITY MEASURESHEASE R.1974; DATA SYST.; G.B.; DA. 1974; VOL. 15; NO 8; PP. 8-9Article

THE ANTISOCIAL USE OF COMPUTERSPARKER DB.1972; COMPUTERS AND AUTOMAT.; U.S.A.; DA. 1972; VOL. 21; NO 8; PP. 22-36 (4P.); BIBL. 22REF.Serial Issue

STORING YOUR MAGNETIC MEDIA1980; MOD. OFF. PROCED.; USA; DA. 1980; VOL. 25; NO 5; PP. 112-116; 3 P.Article

COMPUTER CRIME AND COMPUTER SECURITY: IMPACT ON INFORMATION SYSTEMS1979; INFORMATION CHOICES AND POLICIES. AMERICAN SOCIETY FOR INFORMATION SCIENCE. ANNUAL MEETING. 42/1979/MINNEAPOLIS MN; USA; WHITE PLAINS NY: KNOWLEDGE INDUSTRY PUBLICATIONS; DA. 1979; PP. 346Conference Paper

LA PROTECTION DES BIENS INFORMATIONNELSDELAMARRE G; FOUCHER A.1979; INFORMAT. ET GESTION; FRA; DA. 1979; NO 110; PP. 42-48Article

THE PRIVACY OF COMPUTERIZED RECORDS - THE SWEDISH EXPERIENCE AND POSSIBLE U.S. POLICY IMPACTSNISENOFF N; BISHOP E; CLAYTON A et al.1979; INFORM. PROCESS MANAG.; GBR; DA. 1979; VOL. 15; NO 4; PP. 205-211; BIBL. 9 REF.Article

DATENSICHERUNG VOR UNBERECHTIGTEM ZUGRIFF MIT DEM SIEMENS-DATENBANKSYSTEM UDS. = LA PROTECTION CONTRE UN ACCES NON AUTORISE AU MOYEN DE LA BANQUE DE DONNEES SIEMENS HDSHOLLEDERER K.1978; SIEMENS Z.; DEU; DA. 1978; VOL. 52; NO 4; PP. 254-256; ABS. ENGArticle

COMPUTER SECURITY SAFEGUARDS FOR PRIVACY: THE TECHNICAL ROLE OF NBS.LOWE TC.1976; BULL. AMER. SOC. INFORM. SCI.; U.S.A.; DA. 1976; VOL. 3; NO 1; PP. 16-18Article

LIBRARIES AND PRIVACY LEGISLATIONHARTER SP; BUSHA CH.1976; LIBRARY J.; U.S.A.; DA. 1976; VOL. 101; NO 3; PP. 475-481; BIBL. 33REF.Article

THE NATIONAL ARCHIVES AND FBI RECORDSTHEOHARIS AG.1983; GOVERNMENT PUBLICATIONS REVIEW (1982); ISSN 0277-9390; USA; DA. 1983; VOL. 10; NO 3; PP. 251-255Article

GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYSMATYAS SM; MEYER CH.1978; I.B.M. SYST. J.; USA; DA. 1978; VOL. 17; NO 2; PP. 126-137; BIBL. 4 REF.Article

PROTECTION DU SECRET DES DONNEESGIRSDANSKY MB.1973; INFORMATIQUE; FR.; DA. 1973; NO 36; PP. 29-39; ABS. ANGL.; BIBL. 6REF.Serial Issue

SECURITY REQUIREMENTS AND CONSIDERATIONS IN IBM'S ON-LINE RETRIEVAL SYSTEM-STAIRSVANSCOY JD.sdIN: AM. SOC. INF. SCI. 3RD MID-YEAR MEET. PROC. ON-LINE INF. RETR. SYST. STAND. ACT. AFFECT LIBR. INF. CENT.; JOHNSTOWN, PA.; 1974; INDEPENDENCE, OHIO; FERRO CORP. TECH. CENT.; DA. S. D; PP. (3P.)Conference Paper

DATA BASE SECURITY: REQUIREMENTS, POLICIES, AND MODELSWOOD C; FERNANDEZ EB; SUMMERS RC et al.1980; I.B.M. SYST. J.; USA; DA. 1980; VOL. 19; NO 2; PP. 229-252; BIBL. 27 REF.Article

THE SECURITY OF MANAGER'S INFORMATION1979; E.D.P. ANALYZER; USA; DA. 1979; VOL. 17; NO 7; 13 P.; BIBL. 7 REF.Serial Issue

LA NOTION DE MAINTENANCE EN DOCUMENTATION, TENIR A JOUR DES FICHIERS.SUTTER E.1977; DOCUMENTALISTE; FR.; DA. 1977; VOL. 14; NO 2; PP. 29-33Article

COPYRIGHT PROBLEMS AND USE OF COMPUTERSOLSSON AH.1982; LEXICOGRAPHY IN THE ELECTRONIC AGE. SYMPOSIUM/1981/LUXEMBOURG; NLD/USA/GBR; AMSTERDAM; NEW YORK; OXFORD: NORTH-HOLLAND PUBLISHING COMPANY; DA. 1982; PP. 239-248Conference Paper

INTEGRATING THE DATA ENCRYPTION STANDARD INTO COMPUTER NETWORKSSMID ME.1981; IEEE TRANS. COMMUN.; ISSN 0090-6778; USA; DA. 1981; VOL. 29; NO 6; PP. 762-772; BIBL. 12 REF.Article

A PENETRATION ANALYSIS OF A BURROUGHS LARGE SYSTEMWILKINSON AL; ANDERSON DH; CHANG DP et al.1981; OPER. SYST. REV.; ISSN 0163-5980; USA; DA. 1981; VOL. 15; NO 1; PP. 14-25; BIBL. 7 REF.Article

PRIVACY AND SECURITY IN LOCAL GOVERNMENT INFOSYSTEMS.CAMPBELL VR.1976; INFOSYSTEMS; U.S.A.; DA. 1976; VOL. 23; NO 12; PP. 31-34 (2P.)Article

PRIVACY AND SECURITY IN CENTRALIZED VS. DECENTRALIZED DATABANK SYSTEMSTURN R; SHAPIRO NZ; JUNCOSA ML et al.1975; RAND-P-5346; U.S.A.; DA. 1975; PP. 1-31; BIBL. 2 P.Report

Data protection? But I'm a librarianGILLMAN, P.Aslib proceedings. 1985, Vol 37, Num 8, pp 311-313, issn 0001-253XArticle

COMPUTERISED INFORMATION RETRIEVAL-CLOSED OR OPEN: SOME CRITERIA FOR A CLOSED SYSTEMTAPPER CF.1982; ASLIB PROC.; ISSN 0001-253X; GBR; DA. 1982; VOL. 34; NO 1; PP. 47-53Conference Paper

  • Page / 4