1990 ◽  
Vol 5 (1) ◽  
pp. 38-48
Author(s):  
I. Saitoh ◽  
K. Kawazoe ◽  
S. Tanaka ◽  
M. Yanase

1987 ◽  
Vol CE-33 (4) ◽  
pp. 540-550 ◽  
Author(s):  
Ken Kutaragi ◽  
Katsumi Yamaoka ◽  
Shoji Tanaka ◽  
Koichiro Tsujiino ◽  
Takashi Fukushima ◽  
...  
Keyword(s):  

Author(s):  
Doug White ◽  
Alan Rea

Hard disk wipes are a crucial component of computing security. However, more often than not, hard drives are not adequately processed before either disposing or reusing them within an environment. When an organization does not follow a standard disk wipe procedure, the opportunity to expose sensitive data occurs. More often than not, most organizations do not wipe drives because of the intense time and resource commitment of a highly-secure seven-pass DOD wipe. However, we posit that our one-pass methodology, verified with a zero checksum, is more than adequate for organizations wishing to protect against the loss of sensitive hard drive data.


Author(s):  
Martin H. Weik
Keyword(s):  

1993 ◽  
Vol 17 (1-2) ◽  
pp. 129-139 ◽  
Author(s):  
J. Menon ◽  
J. Roche ◽  
J. Kasson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document