𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Computer Security Techniques: List of controls by cost

✍ Scribed by EstherH. Highland


Book ID
107914560
Publisher
Elsevier Science
Year
1983
Tongue
English
Weight
306 KB
Volume
2
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Control and Game-Theoretical Treatment o
✍ M. Jathe; W. Krabs; J. Scheffran πŸ“‚ Article πŸ“… 1997 πŸ› John Wiley and Sons 🌐 English βš– 484 KB

In this paper a time-discrete dynamic model for the process of disarmament is investigated. The state variables of the system are costs and security values. We assume that the costs can be controlled, and we aim at reducing the costs to zero and achieving non-negative security values after a finite

Application of computer algebra-techniqu
✍ Mustafa Bayram; Ercan Γ‡elik πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 196 KB

For practical purposes the calculation of rate constants is not particularly valuable, since their physical significance is not clear. Of greater practical use are metabolic control coefficients and elasticities. Given the definition of the flux control coefficients C(E)(J), concentration control co