The Community for Technology Leaders
Green Image
Issue No. 05 - September-October (2003 vol. 1)
ISSN: 1540-7993
pp: 93-95
Michael Caloyannides , Mitretek Systems
<p>Protecting the confidentiality of computer usage involves far more than merely protecting the content of individual files. Going to extremes will not protect a computer from every threat, but it's nearly as close as we can get.</p>
Michael Caloyannides, "Keeping Offline Computer Usage Private", IEEE Security & Privacy, vol. 1, no. , pp. 93-95, September-October 2003, doi:10.1109/MSECP.2003.1236245
88 ms
(Ver 3.3 (11022016))