The other quiet professionals : : lessons for future cyber forces from the evolution of special forces / / Christopher Paul, Isaac R. Porche III, Elliot Axelband.

With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S....

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Santa Monica, California : : RAND Corporation,, 2014.
©2014
Year of Publication:2014
Language:English
Physical Description:1 online resource (140 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628446904498
ctrlnum (CKB)3710000000320928
(EBL)1899339
(SSID)ssj0001402616
(PQKBManifestationID)12618729
(PQKBTitleCode)TC0001402616
(PQKBWorkID)11357602
(PQKB)10654947
(Au-PeEL)EBL1899339
(CaPaEBR)ebr11000811
(OCoLC)898770849
(MiAaPQ)EBC1899339
(EXLCZ)993710000000320928
collection bib_alma
record_format marc
spelling Paul, Christopher, 1971- author.
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband.
Santa Monica, California : RAND Corporation, 2014.
©2014
1 online resource (140 p.)
text txt
computer c
online resource cr
Description based upon print version of record.
Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986
CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command
CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy
CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs
How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF
Recognize the Precarious Value of Cyber Forces and Support Them Accordingly
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
English
Includes bibliographical references.
Description based on print version record.
Cyberspace Security measures United States Planning.
Computer networks Security measures United States Planning.
Cyberterrorism United States Prevention Planning.
Information warfare United States.
United States. Strategic Command (2002- ). Cyber Command History.
U.S. Special Operations Command History.
Porche, Isaac, 1968- author.
Axelband, Elliot, author.
0-8330-5973-4
language English
format eBook
author Paul, Christopher, 1971-
Porche, Isaac, 1968-
Axelband, Elliot,
spellingShingle Paul, Christopher, 1971-
Porche, Isaac, 1968-
Axelband, Elliot,
The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986
CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command
CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy
CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs
How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF
Recognize the Precarious Value of Cyber Forces and Support Them Accordingly
author_facet Paul, Christopher, 1971-
Porche, Isaac, 1968-
Axelband, Elliot,
Porche, Isaac, 1968-
Axelband, Elliot,
author_variant c p cp
i p ip
e a ea
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Porche, Isaac, 1968-
Axelband, Elliot,
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Paul, Christopher, 1971-
title The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
title_sub lessons for future cyber forces from the evolution of special forces /
title_full The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband.
title_fullStr The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband.
title_full_unstemmed The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband.
title_auth The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
title_new The other quiet professionals :
title_sort the other quiet professionals : lessons for future cyber forces from the evolution of special forces /
publisher RAND Corporation,
publishDate 2014
physical 1 online resource (140 p.)
contents Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986
CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command
CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy
CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs
How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF
Recognize the Precarious Value of Cyber Forces and Support Them Accordingly
isbn 0-8330-8800-9
0-8330-8802-5
0-8330-5973-4
callnumber-first U - Military Science
callnumber-subject U - General Military Science
callnumber-label U163
callnumber-sort U 3163 P385 42014
geographic_facet United States
United States.
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 355 - Military science
dewey-full 355.3/43
dewey-sort 3355.3 243
dewey-raw 355.3/43
dewey-search 355.3/43
oclc_num 898770849
work_keys_str_mv AT paulchristopher theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
AT porcheisaac theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
AT axelbandelliot theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
AT paulchristopher otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
AT porcheisaac otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
AT axelbandelliot otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces
status_str n
ids_txt_mv (CKB)3710000000320928
(EBL)1899339
(SSID)ssj0001402616
(PQKBManifestationID)12618729
(PQKBTitleCode)TC0001402616
(PQKBWorkID)11357602
(PQKB)10654947
(Au-PeEL)EBL1899339
(CaPaEBR)ebr11000811
(OCoLC)898770849
(MiAaPQ)EBC1899339
(EXLCZ)993710000000320928
carrierType_str_mv cr
is_hierarchy_title The other quiet professionals : lessons for future cyber forces from the evolution of special forces /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653679258894337
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05524nam a2200649 i 4500</leader><controlfield tag="001">993628446904498</controlfield><controlfield tag="005">20230803212323.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">150117t20142014caua ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8800-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8802-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000320928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001402616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)12618729</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001402616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11357602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10654947</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11000811</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898770849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000320928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.P385 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Paul, Christopher,</subfield><subfield code="d">1971-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The other quiet professionals :</subfield><subfield code="b">lessons for future cyber forces from the evolution of special forces /</subfield><subfield code="c">Christopher Paul, Isaac R. Porche III, Elliot Axelband.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, California :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (140 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Recognize the Precarious Value of Cyber Forces and Support Them Accordingly</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Strategic Command (2002- ).</subfield><subfield code="b">Cyber Command</subfield><subfield code="x">History.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">U.S. Special Operations Command</subfield><subfield code="x">History.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Porche, Isaac,</subfield><subfield code="d">1968-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Axelband, Elliot,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-5973-4</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:41:25 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-12-14 03:51:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350453780004498&amp;Force_direct=true</subfield><subfield code="Z">5350453780004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350453780004498</subfield></datafield></record></collection>