LEADER 01343oam 2200433zu 450 001 9910872684003321 005 20241212214950.0 035 $a(CKB)111026746736300 035 $a(SSID)ssj0000558098 035 $a(PQKBManifestationID)12197953 035 $a(PQKBTitleCode)TC0000558098 035 $a(PQKBWorkID)10556832 035 $a(PQKB)11540635 035 $a(NjHacI)99111026746736300 035 $a(EXLCZ)99111026746736300 100 $a20160829d1992 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Security Applications, 8th Annual Conference 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1992 215 $a1 online resource (xxvii, 233 pages) $cillustrations 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780818631153 311 08$a0818631155 606 $aComputer security$vCongresses 606 $aComputers Access control$vCongresses 606 $aData protection$vCongresses 615 0$aComputer security 615 0$aComputers Access control 615 0$aData protection 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a9910872684003321 996 $aComputer Security Applications, 8th Annual Conference$92505790 997 $aUNINA