LEADER 01485oam 2200409zu 450 001 9910376066003321 005 20240606192800.0 035 $a(CKB)3170000000004103 035 $a(SSID)ssj0000812492 035 $a(PQKBManifestationID)11956533 035 $a(PQKBTitleCode)TC0000812492 035 $a(PQKBWorkID)10866356 035 $a(PQKB)11554622 035 $a(Association for Computing Machinery)10.1145/1655062 035 $a(EXLCZ)993170000000004103 100 $a20160829d2009 uy 101 0 $aeng 135 $aurnn#008mam|a 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aProceedings of the 2nd Acm Workshop on Assurable and Usable Security Configuration 210 31$a[Place of publication not identified] :$cAssociation for Computing Machinery,$d2009. 215 $a1 online resource (88 pages) 225 0 $aACM Conferences. 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-60558-778-8 517 3 $aSafeConfig '09 606 $aInformation Technology$xComputer Science (Hardware & Networks) 615 4$aInformation Technology$xComputer Science (Hardware & Networks) 702 $aAl-Shaer$b Ehab S.$f1967- 712 02$aAssociation for Computing Machinery-Digital Library. 801 0$bPQKB 906 $aBOOK 912 $a9910376066003321 996 $aProceedings of the 2nd Acm Workshop on Assurable and Usable Security Configuration$92201703 997 $aUNINA