Computer Security, Part 2

Research output: Contribution to journalEditorial

1 Citation (Scopus)
Original languageEnglish (US)
Article number7763740
Pages (from-to)10-11
Number of pages2
JournalIEEE Annals of the History of Computing
Volume38
Issue number4
DOIs
StatePublished - Oct 1 2016

Fingerprint

Security of data
History of Computing

Keywords

  • CBI
  • computer security
  • Computer Security History Workshop
  • cybersecurity
  • history of computing
  • NSA
  • NSF

Cite this

Computer Security, Part 2. / Yost, Jeffrey R.

In: IEEE Annals of the History of Computing, Vol. 38, No. 4, 7763740, 01.10.2016, p. 10-11.

Research output: Contribution to journalEditorial

@article{1cbbfe41f9664d78b37433f603b8c717,
title = "Computer Security, Part 2",
keywords = "CBI, computer security, Computer Security History Workshop, cybersecurity, history of computing, NSA, NSF",
author = "Yost, {Jeffrey R.}",
year = "2016",
month = "10",
day = "1",
doi = "10.1109/MAHC.2016.44",
language = "English (US)",
volume = "38",
pages = "10--11",
journal = "IEEE Annals of the History of Computing",
issn = "1058-6180",
publisher = "IEEE Computer Society",
number = "4",

}

TY - JOUR

T1 - Computer Security, Part 2

AU - Yost, Jeffrey R.

PY - 2016/10/1

Y1 - 2016/10/1

KW - CBI

KW - computer security

KW - Computer Security History Workshop

KW - cybersecurity

KW - history of computing

KW - NSA

KW - NSF

UR - http://www.scopus.com/inward/record.url?scp=85003952982&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85003952982&partnerID=8YFLogxK

U2 - 10.1109/MAHC.2016.44

DO - 10.1109/MAHC.2016.44

M3 - Editorial

VL - 38

SP - 10

EP - 11

JO - IEEE Annals of the History of Computing

JF - IEEE Annals of the History of Computing

SN - 1058-6180

IS - 4

M1 - 7763740

ER -