1887
Volume 97, Issue 1
  • ISSN 0019-0829
  • E-ISSN: 1783-1490
USD
Buy:$35.00 + Taxes
Preview this article:

Loading

Article metrics loading...

/content/journals/10.1075/itl.97-98.11kuk
1992-01-01
2025-02-12
Loading full text...

Full text loading...

References

  1. Bradburn, D.
    (1990) : “An Introduction to Data Security”. In K. Hearnden (ed.) A Handbook of Computer Security. London : Kogan Page.
    [Google Scholar]
  2. Broadhurst, A.
    (1991): Health and Safety. Pitman.
    [Google Scholar]
  3. Ellison, J.R. - Pritchard, J.A.T.
    (1987): Security in Office Systems. Manchester : NCC Publications.
    [Google Scholar]
  4. Kukulska-Hulme, A.
    (1989): “Dictionnaires informatisés et traduction”, META, Vol.34, 533–538.
    [Google Scholar]
  5. (1990): “Speed Understanding of an Unfamiliar Domain”. In: Czap, H. - Nedobity, W. (eds.) TKE’90 Terminology and Knowledge Engineering, Vol.2. Frankfurt/M : Indeks Verlag, 599–606.
    [Google Scholar]
  6. Madden, W.
    (1990): “Plan for Security”. News 3X)/400, January 1990, 26–33.
    [Google Scholar]
  7. Oliver, E. - Wilson, J.
    (1983): Practical Security in Commerce and Industry. Gower.
    [Google Scholar]
  8. Raymondis, L.M. - Le Guern, M.
    (1976): Le langage de la justice pénale. Paris: CNRS.
    [Google Scholar]
  9. Rentell, M. - Jenner, P.
    (1991): Breakdowns in Computer Security: Commentary and Analysis. London : Computer Weekly & PA Consulting Group.
    [Google Scholar]
  10. Smith, J.
    (ed.) (1988): Information Security Yearbook, 1988/89. IBC Technical Services Ltd.
    [Google Scholar]
/content/journals/10.1075/itl.97-98.11kuk
Loading
  • Article Type: Research Article
This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error