Publication Date:
2019-07-13
Description:
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.
Keywords:
COMPUTER OPERATIONS AND HARDWARE
Type:
NASA-CR-188883
,
NAS 1.26:188883
,
RIACS-TR-91-2
,
Annual Computer Virus and Security Conference; Mar 14, 1991 - Mar 15, 1991; New York, NY; United States
Format:
application/pdf