
System Implications of Information Privacy.
$23.00
{{option.name}}:
{{selected_options[option.position]}}
{{value_obj.value}}
A detailed account of ways to protect computer systems, especially remotely accessible online time-sharing systems, from invasions of privacy, prepared in April 1967. Communication links cannot be physically secured (see RM-3765); the only broadly effective countermeasure against wiretapping methods is privacy transformations (secret codes), which may require additional hardware.
Show More
Show Less