Last update: Fri Mar 2 02:05:31 MST 2018
Top |
Symbols |
Numbers |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Weissman:1998:BRB,
author = "Jon B. Weissman",
title = "Book Review: {{\em Building Secure and Reliable
Network Applications}}",
journal = j-IEEE-CONCURR,
volume = "6",
number = "1",
pages = "84--85",
month = jan # "\slash " # mar,
year = "1998",
CODEN = "IECMFX",
ISSN = "1092-3063 (print), 1558-0849 (electronic)",
ISSN-L = "1092-3063",
bibdate = "Tue Jan 16 06:04:49 MST 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeeconcurrency.bib",
URL = "http://dlib.computer.org/pd/books/pd1998/pdf/p1084.pdf",
acknowledgement = ack-nhfb,
}
Related entries
- application,
5(2)5,
5(3)5,
5(3)19,
5(3)20,
5(3)28,
5(4)32,
5(4)78,
5(4)80,
6(1)16,
6(2)2,
6(2)16,
6(2)71,
6(2)78,
6(3)8,
6(3)17,
6(3)34,
6(4)8,
6(4)11,
6(4)68,
7(1)7,
7(1)22,
7(2)13,
7(2)28,
7(3)2,
7(3)4,
7(3)77,
7(3)80,
7(4)85,
8(2)22,
8(2)80,
8(3)82
- Book,
5(1)80,
5(1)81,
5(1)82,
5(1)85,
5(1)86,
5(2)86,
5(2)88,
5(3)73,
5(3)74,
5(3)75,
5(3)76,
5(4)80,
5(4)81,
5(4)82,
6(1)85,
6(1)86,
6(1)87,
6(2)91,
6(2)92,
6(2)93,
6(2)94,
6(3)85,
6(3)86,
6(3)87,
6(3)88,
6(3)89,
6(3)91,
6(4)78,
6(4)79,
6(4)79,
6(4)80,
7(1)79,
7(2)81,
7(2)81,
7(3)91,
7(3)92,
7(3)93,
7(4)88,
7(4)89,
7(4)91,
8(1)86,
8(2)86,
8(2)86,
8(3)12,
8(4)91
- Building,
5(2)88,
5(4)80,
6(4)57
- network,
5(1)9,
5(1)13,
5(1)16,
5(1)41,
5(1)56,
5(1)68,
5(2)16,
5(2)28,
5(2)60,
5(2)74,
5(3)75,
5(4)18,
5(4)40,
5(4)54,
6(1)47,
6(2)30,
6(3)20,
6(3)42,
6(3)52,
6(4)57,
7(2)16,
8(2)4,
8(2)86,
8(4)9
- Reliable,
5(4)32
- review,
5(1)80,
5(1)81,
5(1)82,
5(1)85,
5(1)86,
5(2)86,
5(2)88,
5(3)73,
5(3)74,
5(3)75,
5(3)76,
5(4)80,
5(4)81,
5(4)82,
6(1)85,
6(1)86,
6(1)87,
6(2)91,
6(2)92,
6(2)93,
6(2)94,
6(3)85,
6(3)86,
6(3)87,
6(3)88,
6(3)89,
6(3)91,
6(4)78,
6(4)79,
6(4)79,
6(4)80,
7(1)79,
7(2)81,
7(2)81,
7(3)91,
7(3)92,
7(3)93,
7(4)88,
7(4)89,
7(4)91,
8(1)86,
8(2)86,
8(2)86,
8(3)12,
8(4)91
- Weissman, Jon B.,
8(3)6