000124596 000__ 00967cam\a2200325W1\4500 000124596 001__ 124596 000124596 005__ 20210513043733.0 000124596 008__ 881227s1989\\\\ncu\\\\\\\\\\\00110\eng\\ 000124596 010__ $$a88-063151 000124596 020__ $$a0874551889 :$$c14.95 000124596 035__ $$a(OCoLC)ocm18986654 000124596 035__ $$a00377475 000124596 035__ $$9AAN8346SI 000124596 035__ $$a124596 000124596 040__ $$aDLC$$cDLC 000124596 049__ $$aISEA 000124596 0500_ $$aQA76.9.A25$$bR63 1989 000124596 0820_ $$a005.8$$219 000124596 099__ $$aQA76.9.A25 R63 1989 000124596 1001_ $$aRoberts, Ralph,$$d1945- 000124596 24510 $$aCompute!'s computer security /$$cRalph Roberts and Pamela Kane. 000124596 260__ $$aGreensboro, NC :$$bCompute! Books,$$cc1989. 000124596 300__ $$a170 p. :$$bill. ;$$c23 cm. 000124596 500__ $$aIncludes index. 000124596 650_0 $$aComputers$$xAccess control. 000124596 650_0 $$aComputer crimes. 000124596 7001_ $$aKane, Pamela. 000124596 7400_ $$aCompute's computer security. 000124596 7400_ $$aComputer security. 000124596 85200 $$bgen$$hQA76.9 .A25$$iR63 1989 000124596 909CO $$ooai:library.usi.edu:124596$$pGLOBAL_SET 000124596 966__ $$c 1$$lUSIGEN$$mBKGEN$$sQA76.9.A25 R63 1989$$p14.95$$xISEA$$z050$$b39203009811600 000124596 980__ $$aBIB 000124596 980__ $$aBOOK