LEADER 01726oam 2200421zu 450 001 9910872508903321 005 20241212214921.0 035 $a(CKB)111026746732926 035 $a(SSID)ssj0000558095 035 $a(PQKBManifestationID)12272948 035 $a(PQKBTitleCode)TC0000558095 035 $a(PQKBWorkID)10558899 035 $a(PQKB)11786857 035 $a(NjHacI)99111026746732926 035 $a(EXLCZ)99111026746732926 100 $a20160829d1989 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Security Applications, 5th Annual Conference 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1989 215 $a1 online resource (373 pages) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780818620065 311 08$a0818620064 330 $aProceedings of the fifth annual conference (see title) held in Tucson, AZ, December, 1989. Addresses the lack of trust that computers can properly control access to widely varying degrees of sensitive information. Treats unclassified systems security, risk management, crime, audit applications, architecture and mechanisms, and security policy and models. Acidic paper; no subject index. Annotation copyrighted by Book News, Inc., Portland, OR. 606 $aComputer security 606 $aElectronic data processing$xSecurity measures 615 0$aComputer security. 615 0$aElectronic data processing$xSecurity measures. 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a9910872508903321 996 $aComputer Security Applications, 5th Annual Conference$92529968 997 $aUNINA