Underlying technical models for information technology security : recommendation of the National Institute of Standards and Technology / Gary Stoneburner
Saved in:
Superior document: | NIST special publication 800-33 : Computer security |
---|---|
VerfasserIn: | |
Place / Publishing House: | Washington, DC : NIST, 2001 |
Year of Publication: | 2001 |
Language: | English |
Series: | NIST special publication
800-33 : Computer security |
Physical Description: | 24 S.; graph. Darst. |
Notes: | Literaturverz. S. 24 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
990000416460504498 |
---|---|
ctrlnum |
AC03398267 (AT-OBV)AC03398267 (Aleph)003390795ACC01 (DE-599)OBVAC03398267 (EXLNZ-43ACC_NETWORK)990033907950203331 |
collection |
bib_alma |
institution |
YWOAW |
building |
MAG2-1 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00844nam#a2200265zcb4500</leader><controlfield tag="001">990000416460504498</controlfield><controlfield tag="005">20230204192447.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">020411|2001####|||###########|||#|#eng#c</controlfield><controlfield tag="009">AC03398267</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AT-OBV)AC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">AC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Aleph)003390795ACC01</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC03398267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLNZ-43ACC_NETWORK)990033907950203331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OAW</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="c">XD-US</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stoneburner, Gary</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Underlying technical models for information technology security</subfield><subfield code="b">recommendation of the National Institute of Standards and Technology</subfield><subfield code="c">Gary Stoneburner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC</subfield><subfield code="b">NIST</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">24 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NIST special publication</subfield><subfield code="v">800-33 : Computer security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 24</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="w">(AT-OBV)AC00350863</subfield><subfield code="v">800-33</subfield></datafield><datafield tag="970" ind1="1" ind2=" "><subfield code="c">24</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-04 19:24:47 Europe/Vienna</subfield><subfield code="d">20</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2018-12-24 06:25:06 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="HOL" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="h"> 100317.800,33 </subfield><subfield code="c">MAG2-1</subfield><subfield code="8">2215804720004498</subfield></datafield><datafield tag="852" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="c">MAG2-1</subfield><subfield code="h"> 100317.800,33 </subfield><subfield code="8">2215804720004498</subfield></datafield><datafield tag="ITM" ind1=" " ind2=" "><subfield code="9">2215804720004498</subfield><subfield code="e">1</subfield><subfield code="m">BOOK</subfield><subfield code="b">+YW568600</subfield><subfield code="i">100317.800,33</subfield><subfield code="2">MAG2-1</subfield><subfield code="o">20020411</subfield><subfield code="8">2315804710004498</subfield><subfield code="f">02</subfield><subfield code="p">2002-04-11 02:00:00 Europe/Vienna</subfield><subfield code="h">100317.800,33</subfield><subfield code="1">YWOAW</subfield><subfield code="q">2022-06-20 23:30:26 Europe/Vienna</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Stoneburner, Gary aut Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner Washington, DC NIST 2001 24 S. graph. Darst. NIST special publication 800-33 : Computer security Literaturverz. S. 24 (AT-OBV)AC00350863 800-33 YWOAW MAG2-1 100317.800,33 2215804720004498 |
language |
English |
format |
Book |
author |
Stoneburner, Gary |
spellingShingle |
Stoneburner, Gary Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology NIST special publication |
author_facet |
Stoneburner, Gary |
author_variant |
g s gs |
author_role |
VerfasserIn |
author_sort |
Stoneburner, Gary |
title |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology |
title_sub |
recommendation of the National Institute of Standards and Technology |
title_full |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner |
title_fullStr |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner |
title_full_unstemmed |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology Gary Stoneburner |
title_auth |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology |
title_new |
Underlying technical models for information technology security |
title_sort |
underlying technical models for information technology security recommendation of the national institute of standards and technology |
series |
NIST special publication |
series2 |
NIST special publication |
publisher |
NIST |
publishDate |
2001 |
physical |
24 S. graph. Darst. |
callnumber-raw |
100317.800,33 |
callnumber-search |
100317.800,33 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT stoneburnergary underlyingtechnicalmodelsforinformationtechnologysecurityrecommendationofthenationalinstituteofstandardsandtechnology |
status_str |
n |
ids_txt_mv |
(AT-OBV)AC03398267 AC03398267 (Aleph)003390795ACC01 (DE-599)OBVAC03398267 (EXLNZ-43ACC_NETWORK)990033907950203331 |
hol852bOwn_txt_mv |
YWOAW |
hol852hSignatur_txt_mv |
100317.800,33 |
hol852cSonderstandort_txt_mv |
MAG2-1 |
itmData_txt_mv |
2002-04-11 02:00:00 Europe/Vienna |
barcode_str_mv |
+YW568600 |
callnumbers_txt_mv |
100317.800,33 |
inventoryNumbers_str_mv |
100317.800,33 |
materialTypes_str_mv |
BOOK |
permanentLibraries_str_mv |
YWOAW |
permanentLocations_str_mv |
MAG2-1 |
inventoryDates_str_mv |
20020411 |
createdDates_str_mv |
2002-04-11 02:00:00 Europe/Vienna |
holdingIds_str_mv |
2215804720004498 |
hierarchy_parent_id |
AC00350863 |
hierarchy_parent_title |
NIST special publication 800-33 : Computer security |
hierarchy_sequence |
800-33 |
is_hierarchy_id |
AC03398267 |
is_hierarchy_title |
Underlying technical models for information technology security recommendation of the National Institute of Standards and Technology |
container_title |
NIST special publication 800-33 : Computer security |
container_reference |
AC00350863 |
_version_ |
1787548301379239937 |