Sophia Antipolis, France

Security in Computer Systems and Communications

Master's
Language: EnglishStudies in English
Subject area: security services
University website: www.eurecom.fr/
Computer
A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment.
Security
No one can build his security upon the nobleness of another person. Two people, when they love each other, grow alike in their tastes and habits and pride, but their moral natures (whatever we may mean by that canting expression) are never welded. The base one goes on being base, and the noble one noble, to the end.
Willa Cather, Alexander's Bridge, Ch. 8 (1912)
Security
No nation can make itself secure by seeking supremacy over all others. We all share responsibility for each other’s security, and only by working to make each other secure can we hope to achieve lasting security for ourselves.
Kofi Annan, Address at the Truman Presidential Museum and Library, Independence, Missouri, USA (11 December 2006)
Security
[T]he production of security should, in the interests of the consumers of this intangible commodity, remain subject to the law of free competition.  …  [N]o government should have the right to prevent another government from going into competition with it, or to require consumers of security to come exclusively to it for this commodity.
Gustave de Molinari, tr. J. Huston McCulloch, §II of The Production of Security (Auburn, AL: Ludwig von Mises Institute, 2009; orig. 1849), pp. 22–23.
Privacy Policy