Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Computer systems
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Database gateway processor risk analysis using fuzzy logic
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (3): 138–144.
Published: 01 August 1998
..., in non‐technical terms, the basic concepts of the application of fuzzy logic modelling to risk analysis. © MCB UP Limited 1998 Computer systems Fuzzy logics Information systems Risk management The traditional approach to performing a risk analysis is to adhere to the following...
Journal Articles
1997 computer crime and security survey
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (2): 78–101.
Published: 01 May 1998
... in Australia today. A representative sample of over 300 Australian companies was surveyed. Of the respondents, 37 per cent had experienced some form of intrusion or other unauthorised use of computer systems in the last 12 months. Nearly 90 per cent of those that had experienced computer‐related incidents had...
Journal Articles
Testing the disaster recovery plan
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (1): 21–27.
Published: 01 March 1995
... costs by breaking down the test procedure into components, modules and full tests. © MCB UP Limited 1995 Check sheets Computer systems Disaster management Disaster recovery Documentation Team leaders Tests For an increasing number of organizations, the loss of their computer...
