Computer Security Techniques: List of controls by cost

Esther H. Highland. Computer Security Techniques: List of controls by cost. Computers & Security, 2(2):189-193, 1983. [doi]

Abstract

Abstract is missing.