Bradburn, D.
(1990) : “An Introduction to Data Security”. In K. Hearnden (ed.) A Handbook of Computer Security. London : Kogan Page.Google Scholar
Broadhurst, A.
(1991): Health and Safety. Pitman.Google Scholar
Ellison, J.R. - Pritchard, J.A.T.
(1987): Security in Office Systems. Manchester : NCC Publications.Google Scholar
Kukulska-Hulme, A.
(1989): “Dictionnaires informatisés et traduction”, META, Vol. 341, 533–538. DOI logoGoogle Scholar
(1990): “Speed Understanding of an Unfamiliar Domain”. In: Czap, H. - Nedobity, W. (eds.) TKE’90 Terminology and Knowledge Engineering, Vol. 21. Frankfurt/M : Indeks Verlag, 599–606.Google Scholar
Madden, W.
(1990): “Plan for Security”. News 3X)/400, January 1990, 26–33.Google Scholar
Oliver, E. - Wilson, J.
(1983): Practical Security in Commerce and Industry. Gower.Google Scholar
Raymondis, L.M. - Le Guern, M.
(1976): Le langage de la justice pénale. Paris: CNRS.Google Scholar
Rentell, M. - Jenner, P.
(1991): Breakdowns in Computer Security: Commentary and Analysis. London : Computer Weekly & PA Consulting Group.Google Scholar
Smith, J.
(ed.) (1988): Information Security Yearbook, 1988/89. IBC Technical Services Ltd.Google Scholar