Human resources systematically applied to ensure computer security
暂无分享,去创建一个
In order to maintain the integrity of a computing service, it is essential to assume that there is no limit to the ingenuity of men who wish to break the service's security measures and no limit to the carelessness of those parties given responsibility for maintaining its integrity.
[1] John M. Hemphill,et al. Security procedures for computer systems , 1973 .
[2] Peter Hamilton. Computer security , 1972 .