{"title":"有关资讯保安","authors":"Li Zhen-yu","doi":"10.4135/9781483381503.n610","DOIUrl":null,"url":null,"abstract":"This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.","PeriodicalId":123341,"journal":{"name":"Computer Knowledge and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Information Security\",\"authors\":\"Li Zhen-yu\",\"doi\":\"10.4135/9781483381503.n610\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.\",\"PeriodicalId\":123341,\"journal\":{\"name\":\"Computer Knowledge and Technology\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Knowledge and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4135/9781483381503.n610\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Knowledge and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4135/9781483381503.n610","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper on information security and appropriate technology, from information security, information communication security, and information content of the three parts of the security of information security to make the discussion of safeguarding information security program.