Underlying technical models for information technology security : recommendation of the National Institute of Standards and Technology / Gary Stoneburner

Saved in:
Bibliographic Details
Superior document:NIST special publication 800-33 : Computer security
VerfasserIn:
Place / Publishing House:Washington, DC : NIST, 2001
Year of Publication:2001
Language:English
Series:NIST special publication 800-33 : Computer security
Physical Description:24 S.; graph. Darst.
Notes:Literaturverz. S. 24
Tags: Add Tag
No Tags, Be the first to tag this record!
id 990000416460504498
ctrlnum AC03398267
(AT-OBV)AC03398267
(Aleph)003390795ACC01
(DE-599)OBVAC03398267
(EXLNZ-43ACC_NETWORK)990033907950203331
collection bib_alma
institution YWOAW
building MAG2-1
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00844nam#a2200265zcb4500</leader><controlfield tag="001">990000416460504498</controlfield><controlfield tag="005">20230204192447.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">020411|2001####|||###########|||#|#eng#c</controlfield><controlfield tag="009">AC03398267</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AT-OBV)AC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">AC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Aleph)003390795ACC01</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLNZ-43ACC_NETWORK)990033907950203331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OAW</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="c">XD-US</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stoneburner, Gary</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Underlying technical models for information technology security</subfield><subfield code="b">recommendation of the National Institute of Standards and Technology</subfield><subfield code="c">Gary Stoneburner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC</subfield><subfield code="b">NIST</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">24 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NIST special publication</subfield><subfield code="v">800-33 : Computer security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 24</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="w">(AT-OBV)AC00350863</subfield><subfield code="v">800-33</subfield></datafield><datafield tag="970" ind1="1" ind2=" "><subfield code="c">24</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-04 19:24:47 Europe/Vienna</subfield><subfield code="d">20</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2018-12-24 06:25:06 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="HOL" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="h"> 100317.800,33 </subfield><subfield code="c">MAG2-1</subfield><subfield code="8">2215804720004498</subfield></datafield><datafield tag="852" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="c">MAG2-1</subfield><subfield code="h"> 100317.800,33 </subfield><subfield code="8">2215804720004498</subfield></datafield><datafield tag="ITM" ind1=" " ind2=" "><subfield code="9">2215804720004498</subfield><subfield code="e">1</subfield><subfield code="m">BOOK</subfield><subfield code="b">+YW568600</subfield><subfield code="i">100317.800,33</subfield><subfield code="2">MAG2-1</subfield><subfield code="o">20020411</subfield><subfield code="8">2315804710004498</subfield><subfield code="f">02</subfield><subfield code="p">2002-04-11 02:00:00 Europe/Vienna</subfield><subfield code="h">100317.800,33</subfield><subfield code="1">YWOAW</subfield><subfield code="q">2022-06-20 23:30:26 Europe/Vienna</subfield></datafield></record></collection>
record_format marc
spelling Stoneburner, Gary aut
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner
Washington, DC NIST 2001
24 S. graph. Darst.
NIST special publication 800-33 : Computer security
Literaturverz. S. 24
(AT-OBV)AC00350863 800-33
YWOAW MAG2-1 100317.800,33 2215804720004498
language English
format Book
author Stoneburner, Gary
spellingShingle Stoneburner, Gary
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology
NIST special publication
author_facet Stoneburner, Gary
author_variant g s gs
author_role VerfasserIn
author_sort Stoneburner, Gary
title Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology
title_sub recommendation of the National Institute of Standards and Technology
title_full Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner
title_fullStr Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner
title_full_unstemmed Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner
title_auth Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology
title_new Underlying technical models for information technology security
title_sort underlying technical models for information technology security recommendation of the national institute of standards and technology
series NIST special publication
series2 NIST special publication
publisher NIST
publishDate 2001
physical 24 S. graph. Darst.
callnumber-raw 100317.800,33
callnumber-search 100317.800,33
illustrated Not Illustrated
work_keys_str_mv AT stoneburnergary underlyingtechnicalmodelsforinformationtechnologysecurityrecommendationofthenationalinstituteofstandardsandtechnology
status_str n
ids_txt_mv (AT-OBV)AC03398267
AC03398267
(Aleph)003390795ACC01
(DE-599)OBVAC03398267
(EXLNZ-43ACC_NETWORK)990033907950203331
hol852bOwn_txt_mv YWOAW
hol852hSignatur_txt_mv 100317.800,33
hol852cSonderstandort_txt_mv MAG2-1
itmData_txt_mv 2002-04-11 02:00:00 Europe/Vienna
barcode_str_mv +YW568600
callnumbers_txt_mv 100317.800,33
inventoryNumbers_str_mv 100317.800,33
materialTypes_str_mv BOOK
permanentLibraries_str_mv YWOAW
permanentLocations_str_mv MAG2-1
inventoryDates_str_mv 20020411
createdDates_str_mv 2002-04-11 02:00:00 Europe/Vienna
holdingIds_str_mv 2215804720004498
hierarchy_parent_id AC00350863
hierarchy_parent_title NIST special publication 800-33 : Computer security
hierarchy_sequence 800-33
is_hierarchy_id AC03398267
is_hierarchy_title Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology
container_title NIST special publication 800-33 : Computer security
container_reference AC00350863
_version_ 1787548301379239937