Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Computing systems' defenses

Computing systems' defenses In 1983, teenagers used computers in their homes to look at and modify data in computers thousands of miles away. Reports of these incidents, television dramas, and the movie "WarGames" have all aroused interest in the subject of how and how effectively computing systems' defenses withstand attacks by unauthorized individuals. The subject is of more than passing concern. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Computing systems' defenses

ACM SIGSAC Review , Volume 4 (1) – Jan 1, 1986

Loading next page...
 
/lp/association-for-computing-machinery/computing-systems-defenses-ULtXEKAoM4
Publisher
Association for Computing Machinery
Copyright
Copyright © 1986 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/15839.15840
Publisher site
See Article on Publisher Site

Abstract

In 1983, teenagers used computers in their homes to look at and modify data in computers thousands of miles away. Reports of these incidents, television dramas, and the movie "WarGames" have all aroused interest in the subject of how and how effectively computing systems' defenses withstand attacks by unauthorized individuals. The subject is of more than passing concern.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Jan 1, 1986

There are no references for this article.