People and Computers XII

Available
0
StarStarStarStarStar
0Reviews
Unknown authorUnknown author
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually d...
Read more
E-book
pdf
Price
44.99 £
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually d...
Read more

Options

  • Formats: pdf
  • ISBN: 9781447136019
  • Publication Date: 14 Mar 2013
  • Publisher: Springer London
  • Product language: English
  • Drm Setting: DRM