-
1Published 1992Subjects: “...Computer security United States Evaluation https://id.loc.gov/authorities/subjects/sh00005674...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Government Document Book -
2by Hamilton, Peter, 1917-2002
Published 1973
//IF NOT LOGGED IN - FORCE LOGIN ?> //ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>Book -
3Published 1992Subjects: “...Computer security United States Evaluation https://id.loc.gov/authorities/subjects/sh00005674...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Government Document Book -
4by Rhile, HowardSubjects: “...Computer security United States...”
Published 1992
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Government Document Book -
5Published 1998Subjects: “...Computer security United States...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Government Document Book -
6by Brock, Jack LSubjects: “...Computer security United States...”
Published 1991
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Government Document Book -
7by Gollmann, DieterSubjects: “...Computer security...”
Published 2006
//IF NOT LOGGED IN - FORCE LOGIN ?> //ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>Book -
8Table of Contents: “...Part I: Introduction: An Overview of Computer Security -- Part II: Foundations: Access Control...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
9
-
10