Personnel: The other half of data security. Jr. & Zajac, B. P. Computers & Security, 7(2):131-132, 1988. Link Paper bibtex @article{ journals/compsec/Zajac88a,
added-at = {2015-03-25T00:00:00.000+0100},
author = {Jr., Bernard P. Zajac},
biburl = {http://www.bibsonomy.org/bibtex/2045c312ccf78cbc31ded44245099b68d/dblp},
ee = {http://dx.doi.org/10.1016/0167-4048(88)90324-0},
interhash = {4f1420dfd5d41d000adc7ff805f82e59},
intrahash = {045c312ccf78cbc31ded44245099b68d},
journal = {Computers & Security},
keywords = {dblp},
number = {2},
pages = {131-132},
title = {Personnel: The other half of data security.},
url = {http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#Zajac88a},
volume = {7},
year = {1988}
}
Downloads: 0
{"_id":"6JRddrzeZKkfdBp6W","bibbaseid":"jr-zajac-personneltheotherhalfofdatasecurity-1988","downloads":0,"creationDate":"2015-05-07T12:05:07.619Z","title":"Personnel: The other half of data security.","author_short":["Jr.","Zajac, B.<nbsp>P."],"year":1988,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/bernard?items=1000","bibdata":{"added-at":"2015-03-25T00:00:00.000+0100","author":["Jr.","Zajac, Bernard P."],"author_short":["Jr.","Zajac, B.<nbsp>P."],"bibtex":"@article{ journals/compsec/Zajac88a,\n added-at = {2015-03-25T00:00:00.000+0100},\n author = {Jr., Bernard P. Zajac},\n biburl = {http://www.bibsonomy.org/bibtex/2045c312ccf78cbc31ded44245099b68d/dblp},\n ee = {http://dx.doi.org/10.1016/0167-4048(88)90324-0},\n interhash = {4f1420dfd5d41d000adc7ff805f82e59},\n intrahash = {045c312ccf78cbc31ded44245099b68d},\n journal = {Computers & Security},\n keywords = {dblp},\n number = {2},\n pages = {131-132},\n title = {Personnel: The other half of data security.},\n url = {http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#Zajac88a},\n volume = {7},\n year = {1988}\n}","bibtype":"article","biburl":"http://www.bibsonomy.org/bibtex/2045c312ccf78cbc31ded44245099b68d/dblp","ee":"http://dx.doi.org/10.1016/0167-4048(88)90324-0","id":"journals/compsec/Zajac88a","interhash":"4f1420dfd5d41d000adc7ff805f82e59","intrahash":"045c312ccf78cbc31ded44245099b68d","journal":"Computers & Security","key":"journals/compsec/Zajac88a","keywords":"dblp","number":"2","pages":"131-132","title":"Personnel: The other half of data security.","type":"article","url":"http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#Zajac88a","volume":"7","year":"1988","bibbaseid":"jr-zajac-personneltheotherhalfofdatasecurity-1988","role":"author","urls":{"Link":"http://dx.doi.org/10.1016/0167-4048(88)90324-0","Paper":"http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#Zajac88a"},"keyword":["dblp"],"downloads":0},"search_terms":["personnel","half","data","security","jr.","zajac"],"keywords":["dblp"],"authorIDs":[],"dataSources":["wvAhRjakvxMweG8ZA"]}