LDR | |
01390cam a2200409 a 4500 |
001 |
|
009095211 |
003 |
|
MiAaHDL |
005 |
|
20101117000000.0 |
006 |
|
m d |
007 |
|
cr bn ---auaua |
008 |
|
000302s1998 cau b 000 0 eng d |
010 |
⊔ |
⊔ |
‡a00265394
|
035 |
⊔ |
⊔ |
‡asdr-ucsc.b2125851x
|
040 |
⊔ |
⊔ |
‡aARL
‡cDLC
‡dCUZ
|
042 |
⊔ |
⊔ |
‡alccopycat
|
043 |
⊔ |
⊔ |
‡an-us---
|
049 |
⊔ |
⊔ |
‡aCUZA
|
050 |
0 |
0 |
‡aUG478
‡b.A53 1998
|
035 |
⊔ |
⊔ |
‡a(OCoLC)40717973
|
100 |
1 |
⊔ |
‡aAnderson, Robert H
|
245 |
1 |
4 |
‡aThe implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures :
‡bwhat can/should the DOD do? /
‡cRobert H. Anderson, Richard O'. Hundley
|
260 |
⊔ |
⊔ |
‡aSanta Monica, Calif. :
‡bRAND,
‡c1998
|
300 |
⊔ |
⊔ |
‡a15 p. ;
‡c28 cm
|
538 |
⊔ |
⊔ |
‡aMode of access: Internet.
|
610 |
1 |
0 |
‡aUnited States.
‡bDept. of Defense
‡xDatabases
‡xManagement
|
650 |
⊔ |
0 |
‡aComputer networks
‡xSecurity measures
|
650 |
⊔ |
0 |
‡aComputers
‡xAccess control
|
650 |
⊔ |
0 |
‡aDatabase security
|
650 |
⊔ |
0 |
‡aSoftware protection
|
650 |
⊔ |
0 |
‡aComputer security
|
651 |
⊔ |
0 |
‡aUnited States
‡xArmed Forces
‡xAutomation
|
700 |
1 |
⊔ |
‡aHundley, Richard O
|
710 |
2 |
⊔ |
‡aRand Corporation
|
CID |
⊔ |
⊔ |
‡a009095211
|
DAT |
0 |
⊔ |
‡a20010330124512.0
‡b20101117000000.0
|
DAT |
1 |
⊔ |
‡a20120815092050.0
‡b2023-04-26T17:54:21Z
|
DAT |
2 |
⊔ |
‡a2023-04-26T17:30:03Z
|
CAT |
⊔ |
⊔ |
‡aSDR-UCSC
‡dIII - MILLENIUM
‡lloader.pl-001-001
|
FMT |
⊔ |
⊔ |
‡aBK
|
HOL |
⊔ |
⊔ |
‡0sdr-ucsc.b2125851x
‡auc1
‡bSDR
‡cUCSC
‡puc1.32106015254219
‡sUC
‡1.b2125851x
|
974 |
⊔ |
⊔ |
‡bUC
‡cUCSC
‡d20230426
‡sgoogle
‡uuc1.32106015254219
‡y1998
‡ric
‡qbib
‡tUS bib date1 >= 1930
|