Proceedings of the Sixth Annual Computer Security Applications Conference

Proceedings of the Sixth Annual Computer Security Applications Conference

4.11 - 1251 ratings - Source



The conference--held December 1990 in Tucson, Arizona--showcased over 50 contributions and panels on network security, cryptography, formal methods, trusted DBMS research, international standards, trusted user interface issues, security engineering risk assessment and audit, ethics, computer crime, COMPUSEC labs in government, and development of trusted systems. No subject index. Acidic paper. Annotation copyrighted by Book News, Inc., Portland, ORPaul T. Ward, aquot;The Transformation Schema: An Extension of the Data Flow Diagram to Represent Timing and Control, aquot; IEEE Transactions on Software Engineering, SE-12. ... Melir Page- Jones, The Practical Guide to Structured Systems Design, Yourdon Press, 1988. 17. ... IEEE, Standard for Software Quality Assurance Plans, ANSI/IEEE Std 730-1984, 17 December 1984. 36. ... C. Hoare, aquot;Proofs of Correctness of Data Representationsaquot;, Acta Informatica, 1, 1, 1972, pp. 217-281. 39.


Title:Proceedings of the Sixth Annual Computer Security Applications Conference
Author: IEEE Computer Society
Publisher:IEEE Computer Society - 1990
ISBN-13:

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.


Click button below to register and download Ebook
Privacy Policy | Contact | DMCA