Rule Based Analysis of Computer Security
Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly...
Main Author: | Baldwin, Robert W. |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149665 |
Similar Items
-
Rule based analysis of computer security
by: Baldwin, Robert W. (Robet William)
Published: (2005) -
Computer aided design of circular tunnels using analysis and knowledge-based rules
by: Brito, Jaime Francisco
Published: (2005) -
Use of computer-based rule systems in graphic design
by: Shea, Timothy E
Published: (2013) -
Computer audit, control and security /
by: 286615 Moeller, Robert R.
Published: (1989) -
Security of computer based information systems/
by: 416467 Lane, V. P.
Published: (1985)