![]() ![]() ![]() ![]() ![]() ![]() ![]() | |||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Trusted recovery
Pages 71-75
|
Categories and Subject Descriptors:
Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5): Unauthorized access (e.g., hacking, phreaking);
General Terms:
Management,
Security
![]() |
![]() |
![]() The Digital Library is published by the Association for Computing Machinery. Copyright © 1999, 2000 ACM, Inc.
This page was last updated Thu, 10 Aug. 2000 12:56 -0500
.
|
![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() |