01696oam 2200409zu 450 99621863860331620210807003556.0(CKB)111026746732926(SSID)ssj0000558095(PQKBManifestationID)12272948(PQKBTitleCode)TC0000558095(PQKBWorkID)10558899(PQKB)11786857(NjHacI)99111026746732926(EXLCZ)9911102674673292620160829d1989 uy engur|||||||||||txtccrComputer Security Applications, 5th Annual Conference[Place of publication not identified]IEEE Computer Society Press19891 online resource (373 pages)Bibliographic Level Mode of Issuance: Monograph0-8186-2006-4 Proceedings of the fifth annual conference (see title) held in Tucson, AZ, December, 1989. Addresses the lack of trust that computers can properly control access to widely varying degrees of sensitive information. Treats unclassified systems security, risk management, crime, audit applications, architecture and mechanisms, and security policy and models. Acidic paper; no subject index. Annotation copyrighted by Book News, Inc., Portland, OR.Computer securityElectronic data processingSecurity measuresComputer security.Electronic data processingSecurity measures.005.8PQKBBOOK996218638603316Computer Security Applications, 5th Annual Conference2529968UNISA