{"has_more":false,"total_items":2,"items":[{"vg_id":0,"journal":") codified at 42 USC § § 1973ff-1(e)(6) Security and Privacy Protections, largely repeated at § 578","volume":577,"authors":[{"author_name":"Move See"},{"author_name":" Act"}]},{"vg_id":0,"published_date":1975,"journal":"These layers involve technological options, e.g., automatic logging, system recovery; administrative and operational personnel","volume":63,"page_from":1278,"title":"Thus, if one defense fails, is penetrated or is bypassed, other defenses will remain effective. See also Jerry H. Saltzer & Mike D. Schroeder The Protection of Information in Computer Systems","page_to":1308}]}