Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("PROTECTION FICHIER")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 107

  • Page / 5
Export

Selection :

  • and

STATISTICAL CONFIDENTIALITY: SOME THEORY AND APPLICATIONS TO DATA DISSEMINATION.FELLEGI IP; PHILLIPS JL.1974; ANN. ECON. SOC. MEASUR.; U.S.A.; DA. 1974; VOL. 3; NO 2; PP. 399-409; BIBL. 5 REF.Article

PRIVACY AND PROTECTION IN OPERATING SYSTEMSBRANSTAN DK.1973; COMPUTER; U.S.A.; DA. 1973; VOL. 6; NO 1; PP. 43-46Serial Issue

PRIVACY, SECURITY AND RESPONSIBILITY.BENJAMIN AA.1978; IN: TRANSNATL DATA REGUL. CONF.; BRUSSELS; 1978; UXBRIDGE; ONLINE CONFERENCES LTD; DA. 1978; PP. 1-8Conference Paper

SECURITY IN A STATISTICAL DATA BASEMOHAMMED INAM ULHAQ.1974; IN: INF. UTIL. PROC. 37TH. ASIS ANNU. MEET. XI; ATLANTA, GA.; 1974; WASHINGTON, D.C.; AM. SOC. INF. SCI.; DA. 1974; PP. 33-39; BIBL. 11REF.Conference Paper

INSTALLING SECURITY MEASURESHEASE R.1974; DATA SYST.; G.B.; DA. 1974; VOL. 15; NO 8; PP. 8-9Article

THE ANTISOCIAL USE OF COMPUTERSPARKER DB.1972; COMPUTERS AND AUTOMAT.; U.S.A.; DA. 1972; VOL. 21; NO 8; PP. 22-36 (4P.); BIBL. 22REF.Serial Issue

STORING YOUR MAGNETIC MEDIA1980; MOD. OFF. PROCED.; USA; DA. 1980; VOL. 25; NO 5; PP. 112-116; 3 P.Article

COMPUTER CRIME AND COMPUTER SECURITY: IMPACT ON INFORMATION SYSTEMS1979; INFORMATION CHOICES AND POLICIES. AMERICAN SOCIETY FOR INFORMATION SCIENCE. ANNUAL MEETING. 42/1979/MINNEAPOLIS MN; USA; WHITE PLAINS NY: KNOWLEDGE INDUSTRY PUBLICATIONS; DA. 1979; PP. 346Conference Paper

ON MANAGING INTERFERENCE CAUSED BY DATABASE SHARING. = CONDUITE A TENIR VIS-A-VIS DES INTERFERENCES DUES A L'UTILISATION EN COMMUN D'UNE BASE DE DONNEESTRINCHIERI M.1975; ALTA FREG.; ITAL.; DA. 1975; VOL. 44; NO 11; PP. 641-650; ABS. ITAL.; BIBL. 7 REF.Article

LA PROTECTION DES BIENS INFORMATIONNELSDELAMARRE G; FOUCHER A.1979; INFORMAT. ET GESTION; FRA; DA. 1979; NO 110; PP. 42-48Article

PRIVACY AND SECURITY IN PERSONAL INFORMATION DATA BANK SYSTEMS.TURN R.1974; RAND-R-1044-NSF; U.S.A.; DA. 1974; PP. (121P.); BIBL. 7 P. 1/2Report

REMARKS ON THE INSTRUMENTATION OF DATABANK SYSTEMS FOR DATA SECURITY.TURN R.1974; RAND-P-5151; U.S.A.; DA. 1974; PP. 1-9; BIBL. 1 P.Report

A BACK-END COMPUTER FOR DATA BASE MANAGEMENT.CANADAY RH; HARRISON RD; IVIE EL et al.1974; COMMUNIC. A.C.M.; U.S.A.; DA. 1974; VOL. 17; NO 10; PP. 575-582; BIBL. 7 REF.Article

DATA SECURITY IN DATA BASE SYSTEMS = SECURITE DES DONNEES DANS LES SYSTEMES A BASE DE DONNEES1971; IN: AM. FED. INF. PROCESS. SOC. FALL JT COMPUT. CONF. LAS VEGAS, NEV., 1971; MONTVALE, N.J.; AFIPS PRESS; DA. 1971; PP. 571-601; BIBL. 1 P. 1/2Conference Proceedings

THE NATIONAL ARCHIVES AND FBI RECORDSTHEOHARIS AG.1983; GOVERNMENT PUBLICATIONS REVIEW (1982); ISSN 0277-9390; USA; DA. 1983; VOL. 10; NO 3; PP. 251-255Article

GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYSMATYAS SM; MEYER CH.1978; I.B.M. SYST. J.; USA; DA. 1978; VOL. 17; NO 2; PP. 126-137; BIBL. 4 REF.Article

PROTECTION DU SECRET DES DONNEESGIRSDANSKY MB.1973; INFORMATIQUE; FR.; DA. 1973; NO 36; PP. 29-39; ABS. ANGL.; BIBL. 6REF.Serial Issue

SECURITY REQUIREMENTS AND CONSIDERATIONS IN IBM'S ON-LINE RETRIEVAL SYSTEM-STAIRSVANSCOY JD.sdIN: AM. SOC. INF. SCI. 3RD MID-YEAR MEET. PROC. ON-LINE INF. RETR. SYST. STAND. ACT. AFFECT LIBR. INF. CENT.; JOHNSTOWN, PA.; 1974; INDEPENDENCE, OHIO; FERRO CORP. TECH. CENT.; DA. S. D; PP. (3P.)Conference Paper

DATA BASE SECURITY: REQUIREMENTS, POLICIES, AND MODELSWOOD C; FERNANDEZ EB; SUMMERS RC et al.1980; I.B.M. SYST. J.; USA; DA. 1980; VOL. 19; NO 2; PP. 229-252; BIBL. 27 REF.Article

THE SECURITY OF MANAGER'S INFORMATION1979; E.D.P. ANALYZER; USA; DA. 1979; VOL. 17; NO 7; 13 P.; BIBL. 7 REF.Serial Issue

LA NOTION DE MAINTENANCE EN DOCUMENTATION, TENIR A JOUR DES FICHIERS.SUTTER E.1977; DOCUMENTALISTE; FR.; DA. 1977; VOL. 14; NO 2; PP. 29-33Article

COPYRIGHT PROBLEMS AND USE OF COMPUTERSOLSSON AH.1982; LEXICOGRAPHY IN THE ELECTRONIC AGE. SYMPOSIUM/1981/LUXEMBOURG; NLD/USA/GBR; AMSTERDAM; NEW YORK; OXFORD: NORTH-HOLLAND PUBLISHING COMPANY; DA. 1982; PP. 239-248Conference Paper

INTEGRATING THE DATA ENCRYPTION STANDARD INTO COMPUTER NETWORKSSMID ME.1981; IEEE TRANS. COMMUN.; ISSN 0090-6778; USA; DA. 1981; VOL. 29; NO 6; PP. 762-772; BIBL. 12 REF.Article

A PENETRATION ANALYSIS OF A BURROUGHS LARGE SYSTEMWILKINSON AL; ANDERSON DH; CHANG DP et al.1981; OPER. SYST. REV.; ISSN 0163-5980; USA; DA. 1981; VOL. 15; NO 1; PP. 14-25; BIBL. 7 REF.Article

PRIVACY AND SECURITY IN LOCAL GOVERNMENT INFOSYSTEMS.CAMPBELL VR.1976; INFOSYSTEMS; U.S.A.; DA. 1976; VOL. 23; NO 12; PP. 31-34 (2P.)Article

  • Page / 5