LEADER 01326oam 2200421zu 450 001 996202627103316 005 20210807003535.0 035 $a(CKB)111026746736300 035 $a(SSID)ssj0000558098 035 $a(PQKBManifestationID)12197953 035 $a(PQKBTitleCode)TC0000558098 035 $a(PQKBWorkID)10556832 035 $a(PQKB)11540635 035 $a(NjHacI)99111026746736300 035 $a(EXLCZ)99111026746736300 100 $a20160829d1992 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputer Security Applications, 8th Annual Conference 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1992 215 $a1 online resource (xxvii, 233 pages) $cillustrations 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8186-3115-5 606 $aComputer security$vCongresses 606 $aComputers Access control$vCongresses 606 $aData protection$vCongresses 615 0$aComputer security 615 0$aComputers Access control 615 0$aData protection 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a996202627103316 996 $aComputer Security Applications, 8th Annual Conference$92505790 997 $aUNISA