Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security through legality

Security through legality The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Communications of the ACM Association for Computing Machinery

Loading next page...
 
/lp/association-for-computing-machinery/security-through-legality-xFCz0i30Eg

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2006 by ACM Inc.
ISSN
0001-0782
DOI
10.1145/1132469.1132499
Publisher site
See Article on Publisher Site

Abstract

The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.

Journal

Communications of the ACMAssociation for Computing Machinery

Published: Jun 1, 2006

There are no references for this article.