Proceedings of the second ACM workshop on Role-based access control |
- pisbn : 978-0-89791-985-2
- doi : 10.1145/266741
|
Fulltext
|
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices |
- pisbn : 978-1-4503-1666-8
- doi : 10.1145/2381934
|
Fulltext
|
Proceedings of the second ACM workshop on Storage security and survivability |
- pisbn : 978-1-59593-552-6
- doi : 10.1145/1179559
|
Fulltext
|
Proceedings of the second ACM-SIGOA conference on Office information systems |
- pisbn : 978-0-89791-140-5
- doi : 10.1145/800023
|
Fulltext
|
Proceedings of the second Australasian conference on Interactive entertainment |
- pisbn : 978-0-9751533-2-1
- doi : 10.5555/1109180
|
Fulltext
|
Proceedings of the second Nordic conference on Human-computer interaction |
- pisbn : 978-1-58113-616-6
- doi : 10.1145/572020
|
Fulltext
|
Proceedings of the second SIGCPR conference on Computer personnel research |
- pisbn : 978-1-4503-7811-6
- doi : 10.1145/1142635
|
Fulltext
|
Proceedings of the second SIGCSE technical symposium on Education in computer science |
- pisbn : 978-1-4503-7461-3
- doi : 10.1145/800155
|
Fulltext
|
Proceedings of the second USENIX symposium on Operating systems design and implementation |
- pisbn : 978-1-880446-82-9
- doi : 10.1145/238721
|
Fulltext
|
Proceedings of the second and third annual workshops on Forth |
- pisbn : 978-0-89791-462-8
- doi : 10.1145/259965
|
Fulltext
|