Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/sac/Anderson92
%A Anderson, Troy E.
%B SAC
%D 1992
%E Berghel, Hal
%E Deaton, Ed
%E Hedrick, George E.
%E Roach, David
%E Wainwright, Roger L.
%I ACM
%K dblp
%P 1118-1122
%T Management guidelines for PC security.
%U http://dblp.uni-trier.de/db/conf/sac/sac1992.html#Anderson92
%@ 0-89791-502-X
@inproceedings{conf/sac/Anderson92,
added-at = {2018-11-06T00:00:00.000+0100},
author = {Anderson, Troy E.},
biburl = {https://www.bibsonomy.org/bibtex/2f1e4eeab36cd34b9b416b68d789c8c86/dblp},
booktitle = {SAC},
crossref = {conf/sac/1992},
editor = {Berghel, Hal and Deaton, Ed and Hedrick, George E. and Roach, David and Wainwright, Roger L.},
ee = {https://doi.org/10.1145/130069.130139},
interhash = {2594fcfd74bd3a34b08d4c7083a442c7},
intrahash = {f1e4eeab36cd34b9b416b68d789c8c86},
isbn = {0-89791-502-X},
keywords = {dblp},
pages = {1118-1122},
publisher = {ACM},
timestamp = {2018-11-07T13:15:35.000+0100},
title = {Management guidelines for PC security.},
url = {http://dblp.uni-trier.de/db/conf/sac/sac1992.html#Anderson92},
year = 1992
}