Statements (15)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:book
|
| gptkbp:editor |
gptkb:Peter_J._Denning
|
| gptkbp:ISBN |
978-0201508642
|
| gptkbp:language |
English
|
| gptkbp:mediaType |
gptkb:print
|
| gptkbp:pages |
464
|
| gptkbp:publicationYear |
1990
|
| gptkbp:publisher |
gptkb:Addison-Wesley
gptkb:ACM_Press |
| gptkbp:subject |
computer security
cybersecurity |
| gptkbp:bfsParent |
gptkb:Peter_J._Denning
gptkb:Peter_Denning |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Computers Under Attack
|