This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Keeping Offline Computer Usage Private
September-October 2003 (vol. 1 no. 5)
pp. 93-95
Michael Caloyannides, Mitretek Systems

Protecting the confidentiality of computer usage involves far more than merely protecting the content of individual files. Going to extremes will not protect a computer from every threat, but it's nearly as close as we can get.

Citation:
Michael Caloyannides, "Keeping Offline Computer Usage Private," IEEE Security & Privacy, vol. 1, no. 5, pp. 93-95, Sept.-Oct. 2003, doi:10.1109/MSECP.2003.1236245
Usage of this product signifies your acceptance of the Terms of Use.