Last update: Fri Jan 5 02:08:04 MST 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Swaine:2003:PPAa,
author = "Michael Swaine",
title = "Programming Paradigms: Attacks and Accidents",
journal = j-DDJ,
volume = "28",
number = "1",
pages = "61--63",
month = jan,
year = "2003",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Thu Jun 12 05:46:20 MDT 2003",
bibsource = "http://www.ddj.com/articles/2003/0301/;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs-2000.bib",
URL = "http://www.ddj.com/documents/s=7758/ddj0301h/",
abstract = "Does network topology play a role in secure
networking? That's just one of the questions Michael
asks this month",
acknowledgement = ack-nhfb,
journal-URL = "http://www.ddj.com/",
}
Related entries
- 26-1-88, 26-2-74,
26(4)129,
26(12)102,
27(1)69,
27(2)8,
27(2)87,
27(12)73,
28(5)80
- 26-5-115, 26-6-93, 26-6-125,
26(7)105,
26(9)103,
26(10)99,
26(11)99,
26(12)95,
27(1)63,
27(2)83,
27(3)71,
27(4)85,
27(5)69,
27(6)79,
27(7)75,
27(7)79,
27(8)z,
27(8)z-10,
27(10)z,
27(11)73,
28(5)77,
28(7)68
- 26-8-63,
26(9)103,
26(10)99,
26(11)21,
26(11)99,
26(12)95,
27(2)83,
27(11)73,
27(12)84,
28(5)77,
28(7)68
- 27-1-76,
27(11)10,
27(1)112,
27(2)83,
27(2)112,
27(3)71,
27(3)112,
27(4)85,
27(4)112,
27(5)69,
27(5)104,
27(6)79,
27(6)104,
27(7)75,
27(7)104,
27(8)z-10,
27(8)z-19,
27(9)104,
27(10)92,
27(10)z,
27(11)73,
27(11)84,
27(12)84,
27(12)z,
28(1)76,
28(2)80,
28(2)z
- 27-2-101,
27(3)103,
27(4)106,
27(5)18,
27(5)98,
27(6)98,
27(7)98,
27(8)z-13,
27(9)97,
27(10)89,
28(4)16,
27(2)107,
27(11)82,
27(12)73,
28(1)67,
28(3)69,
28(4)79,
28(5)84,
28(6)76,
28(7)75,
27(3)14
- 27-2-90,
27(10)z
- 28-1-52,
28(2)75
- ask,
26(4)125
- do, 25-1-103,
25(1)113,
25(5)18,
25(7)119,
26(7)99,
26(7)125,
26(8)115,
26(11)99,
27(6)91,
27(7)65,
27(10)z
- just,
25(1)116,
25(12)141,
25(12)149,
26(7)18,
26(7)135,
26(10)130,
26(11)99,
27(1)82,
27(6)14,
27(7)65,
27(8)z-9
- networking, 25-3-62, 26-8-63,
27(1)50,
27(4)75
- play, 25-4-34, 26-2-10,
26(3)121,
26(9)107,
27(5)14
- role,
26(1)21
- secure,
25(11)21,
26(2)21,
26(5)151,
26(7)8,
26(11)73