Terminological Cross-mapping for a Sub-domain of Computing
References (10)
Bradburn, D. (1990) : “An Introduction to Data Security”. In K. Hearnden (ed.) A Handbook of Computer Security. London : Kogan Page.
Broadhurst, A. (1991): Health and Safety. Pitman.
Ellison, J.R. - Pritchard, J.A.T. (1987): Security in Office Systems. Manchester : NCC Publications.
Kukulska-Hulme, A. (1989): “Dictionnaires informatisés et traduction”, META, Vol. 341, 533–538.
Kukulska-Hulme, A. (1990): “Speed Understanding of an Unfamiliar Domain”. In: Czap, H. - Nedobity, W. (eds.) TKE’90 Terminology and Knowledge Engineering, Vol. 21. Frankfurt/M : Indeks Verlag, 599–606.
Madden, W. (1990): “Plan for Security”. News 3X)/400, January 1990, 26–33.
Oliver, E. - Wilson, J. (1983): Practical Security in Commerce and Industry. Gower.
Raymondis, L.M. - Le Guern, M. (1976): Le langage de la justice pénale. Paris: CNRS.
Rentell, M. - Jenner, P. (1991): Breakdowns in Computer Security: Commentary and Analysis. London : Computer Weekly & PA Consulting Group.
Smith, J. (ed.) (1988): Information Security Yearbook, 1988/89. IBC Technical Services Ltd.