default search action
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal"
- exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics"
- boolean and: separate words by space
e.g., codd model
- boolean or: connect words by pipe symbol (|)
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
found 8 matches
- Paul G. Comba:
Approaches to cryptographic key management. PCS 1986: 38-45
- George Hertzberg:
Human behavior factors in PC control. PCS 1986: 46-56
- Don Holden:
The role of the host computer in defending against P.C.s. PCS 1986: 28-37
- William Jennings:
Microcomputer management of the Bank of New England. PCS 1986: 21-27
- Stanley A. Kurzban, James A. Schweitzer, Don Holden, Paul G. Comba, George Hertzberg, Bill Miller:
Panel discussion (panel session). PCS 1986: 57-62
- William Murray:
Good security practice for personal computers. PCS 1986: 1-12
- James A. Schweitzer:
Security awareness. PCS 1986: 13-20
- David R. Callaghan, Leslie D. Ball:
Proceedings of the Northeast ACM Symposium on Personal Computer Security, PCS 1986, Waltham, Massachusetts, USA, 1986. ACM 1986, ISBN 978-0-89791-251-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.