Terminological Cross-mapping for a Sub-domain of Computing
References
Bradburn, D.
(
1990) : “
An Introduction to Data Security”. In
K. Hearnden (ed.)
A Handbook of Computer Security. London : Kogan Page.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Broadhurst, A.
(
1991):
Health and Safety. Pitman.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Ellison, J.R. - Pritchard, J.A.T.
(
1987):
Security in Office Systems. Manchester : NCC Publications.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Kukulska-Hulme, A.
(
1989): “
Dictionnaires informatisés et traduction”,
META, Vol. 341, 533–538.
![DOI logo](https://benjamins.com/logos/doi-logo.svg)
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Kukulska-Hulme, A.
(
1990): “
Speed Understanding of an Unfamiliar Domain”. In:
Czap, H. -
Nedobity, W. (eds.)
TKE’90 Terminology and Knowledge Engineering, Vol. 21. Frankfurt/M : Indeks Verlag, 599–606.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Madden, W.
(
1990): “
Plan for Security”.
News 3X)/400, January 1990, 26–33.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Oliver, E. - Wilson, J.
(
1983):
Practical Security in Commerce and Industry. Gower.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Raymondis, L.M. - Le Guern, M.
(
1976):
Le langage de la justice pénale. Paris: CNRS.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Rentell, M. - Jenner, P.
(
1991):
Breakdowns in Computer Security: Commentary and Analysis. London : Computer Weekly & PA Consulting Group.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)
Smith, J.
(ed.) (
1988):
Information Security Yearbook, 1988/89. IBC Technical Services Ltd.
![Google Scholar](https://benjamins.com/logos/google-scholar.svg)