*001348411
*00520250613104216.0
*007ta
*008150401s2003 gw 100 u eng d
*00901931cam a2200421 c 4500
*019 $bl
*020 $a3540007083$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990304603954702201
*035 $a(NO-LaBS)14415137(bibid)
*035 $a(NO-TrBIB)030460395
*035 $a030460395-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.4.056
*084 $aC.2.0$2acmccs
*084 $aD.4.6$2acmccs
*084 $aK.6.5$2acmccs
*1112 $aISSS 2002$0(NO-TrBIB)3044009$_62866100
*24510$aSoftware security - theories and systems :$bMEXT-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002 : revised papers$cMitsuhiro Okada ... [et al.] (eds.)
*260 $aBerlin$bSpringer$cc2003
*300 $aXI, 470 s.$bill.
*4901 $aLecture notes in computer science$v2609
*650 0$aComputer security$_10202500
*650 7$aDatamaskinprogrammer$xSikkerhet$2tekord$vKongresser$_203828500
*650 7$aDatasikkerhet$0(NO-TrBIB)REAL005212$2noubomn$_185599800
*650 7$aDatasikkerhet$2tekord$9nob$_187404500
*650 7$aNettverk$0(NO-TrBIB)REAL009975$2noubomn$_203803000
*650 7$aOperativsystemer$0(NO-TrBIB)REAL004282$2noubomn$_193867100
*7001 $aOkada, M.$0(NO-TrBIB)90539904$_62866200
*7760 $tISSS 2002$w990317509314702201
*830 0$aLecture notes in computer science$v2609$_13074400
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540007083
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540007081
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540007081
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/1/8/9783540007081.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/1/8/9783540007081.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/3/8/3540007083.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990304603954702202$b2021-11-14T20:13:16Z$z990304603954702202
^