Last update: Wed Sep 26 02:07:32 MDT 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Amoroso:1993:GCC,
author = "Edward G. Amoroso",
title = "A graduate course in computing security technology",
journal = j-SIGCSE,
volume = "25",
number = "1",
pages = "251--255",
month = mar,
year = "1993",
CODEN = "SIGSD3",
DOI = "https://doi.org/10.1145/169073.169477",
ISSN = "0097-8418 (print), 2331-3927 (electronic)",
ISSN-L = "0097-8418",
bibdate = "Sat Nov 17 18:57:20 MST 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/sigcse1990.bib",
acknowledgement = ack-nhfb,
fjournal = "SIGCSE Bulletin (ACM Special Interest Group on
Computer Science Education)",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J688",
}
Related entries
- graduate,
22(2)15,
22(3)25,
22(3)47,
22(4)5,
22(4)49,
23(2)39,
24(1)87,
24(1)134,
24(1)163,
24(1)207,
24(1)309,
24(2)59,
24(3)1,
24(3)24,
24(4)15,
26(1)6,
26(1)141,
26(3)56,
26(3)58,
26(4)5,
26(4)9,
27(1)126,
27(1)146,
27(4)60,
28(1)93,
28(1)102,
28(1)237,
28(1)373,
28(4)33,
28(4)59,
29(1)145,
29(1)174,
29(1)320,
29(1)355,
29(1)371,
29(2)11,
29(2)39,
29(3)6,
29(3)8,
30(1)25,
30(1)82,
30(1)366,
30(1)378,
30(2)15,
30(3)90,
30(3)264,
30(3)311,
31(1)73,
31(1)119,
31(1)165,
31(1)346,
31(1)351,
31(1)352,
31(2)31,
31(2)69,
31(2)73,
31(3)115,
31(3)205,
31(4)4,
31(4)19,
31(4)56,
31(4)106
- security,
26(3)22,
27(2)2,
30(3)175,
30(3)275,
31(1)119,
31(1)165,
31(2)42,
31(3)119,
31(3)187