It looks like you're offline.
Open Library logo
additional options menu
Last edited by Tom Morris
September 2, 2023 | History

Carl E. Landwehr

We need a photo of Carl E. Landwehr

8 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Dependable computing for critical applications 3

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Database security: results of the IFIP WG 11.3 initial meeting, Annapolis, Maryland, U.S.A., October 1987

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Database Security, II: Status and Prospects : Results of the Ifip Wg 11.3 Workshop on Database Security Kingston, Ontario, Canada 5-7 October 1988

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: An abstract type for statistics collection in SIMULA

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Software engineering techniques applied to protocol simulation

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: A survey of formal models for computer security

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Best available technologies (BATs) for computer security

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
September 2, 2023 Edited by Tom Morris merge authors
April 29, 2008 Created by an anonymous user initial import