01726oam 2200421zu 450 991087250890332120241212214921.0(CKB)111026746732926(SSID)ssj0000558095(PQKBManifestationID)12272948(PQKBTitleCode)TC0000558095(PQKBWorkID)10558899(PQKB)11786857(NjHacI)99111026746732926(EXLCZ)9911102674673292620160829d1989 uy engur|||||||||||txtccrComputer Security Applications, 5th Annual Conference[Place of publication not identified]IEEE Computer Society Press19891 online resource (373 pages)Bibliographic Level Mode of Issuance: Monograph9780818620065 0818620064 Proceedings of the fifth annual conference (see title) held in Tucson, AZ, December, 1989. Addresses the lack of trust that computers can properly control access to widely varying degrees of sensitive information. Treats unclassified systems security, risk management, crime, audit applications, architecture and mechanisms, and security policy and models. Acidic paper; no subject index. Annotation copyrighted by Book News, Inc., Portland, OR.Computer securityElectronic data processingSecurity measuresComputer security.Electronic data processingSecurity measures.005.8PQKBBOOK9910872508903321Computer Security Applications, 5th Annual Conference2529968UNINA