Penetration of Computer Systems - An Overview
Author
R. D. Lackey
Entry type
article
Abstract
Eric Clamons says that when this project was begun they wondered why so little
was written about computer penetration. At first they thought nobody wanted to
hand a burglar his tools. But now they know: in the search for a new way to
present the subject they discovered that whay applies to all systems is trival,
and what is of depth applies only to a specific system.
The first part of this paper does present successfully a not too trival
generalization of methods of attack; later a continual battle between trivia
and specifics can be seen.
Can our readers do better?
Date
1974
Address
Phoenix, AZ
Journal
HoneyWell Computer Journal
Key alpha
Lackey
Number
2
Pages
81-85
Volume
8
Publication Date
0000-00-00
Location
A hard-copy of this is in the Papers Cabinet

