The other quiet professionals : : lessons for future cyber forces from the evolution of special forces / / Christopher Paul, Isaac R. Porche III, Elliot Axelband.
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S....
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Santa Monica, California : : RAND Corporation,, 2014. ©2014 |
Year of Publication: | 2014 |
Language: | English |
Physical Description: | 1 online resource (140 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628446904498 |
---|---|
ctrlnum |
(CKB)3710000000320928 (EBL)1899339 (SSID)ssj0001402616 (PQKBManifestationID)12618729 (PQKBTitleCode)TC0001402616 (PQKBWorkID)11357602 (PQKB)10654947 (Au-PeEL)EBL1899339 (CaPaEBR)ebr11000811 (OCoLC)898770849 (MiAaPQ)EBC1899339 (EXLCZ)993710000000320928 |
collection |
bib_alma |
record_format |
marc |
spelling |
Paul, Christopher, 1971- author. The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband. Santa Monica, California : RAND Corporation, 2014. ©2014 1 online resource (140 p.) text txt computer c online resource cr Description based upon print version of record. Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986 CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF Recognize the Precarious Value of Cyber Forces and Support Them Accordingly With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces. English Includes bibliographical references. Description based on print version record. Cyberspace Security measures United States Planning. Computer networks Security measures United States Planning. Cyberterrorism United States Prevention Planning. Information warfare United States. United States. Strategic Command (2002- ). Cyber Command History. U.S. Special Operations Command History. Porche, Isaac, 1968- author. Axelband, Elliot, author. 0-8330-5973-4 |
language |
English |
format |
eBook |
author |
Paul, Christopher, 1971- Porche, Isaac, 1968- Axelband, Elliot, |
spellingShingle |
Paul, Christopher, 1971- Porche, Isaac, 1968- Axelband, Elliot, The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986 CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF Recognize the Precarious Value of Cyber Forces and Support Them Accordingly |
author_facet |
Paul, Christopher, 1971- Porche, Isaac, 1968- Axelband, Elliot, Porche, Isaac, 1968- Axelband, Elliot, |
author_variant |
c p cp i p ip e a ea |
author_role |
VerfasserIn VerfasserIn VerfasserIn |
author2 |
Porche, Isaac, 1968- Axelband, Elliot, |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Paul, Christopher, 1971- |
title |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / |
title_sub |
lessons for future cyber forces from the evolution of special forces / |
title_full |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband. |
title_fullStr |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband. |
title_full_unstemmed |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / Christopher Paul, Isaac R. Porche III, Elliot Axelband. |
title_auth |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / |
title_new |
The other quiet professionals : |
title_sort |
the other quiet professionals : lessons for future cyber forces from the evolution of special forces / |
publisher |
RAND Corporation, |
publishDate |
2014 |
physical |
1 online resource (140 p.) |
contents |
Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986 CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF Recognize the Precarious Value of Cyber Forces and Support Them Accordingly |
isbn |
0-8330-8800-9 0-8330-8802-5 0-8330-5973-4 |
callnumber-first |
U - Military Science |
callnumber-subject |
U - General Military Science |
callnumber-label |
U163 |
callnumber-sort |
U 3163 P385 42014 |
geographic_facet |
United States United States. |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
355 - Military science |
dewey-full |
355.3/43 |
dewey-sort |
3355.3 243 |
dewey-raw |
355.3/43 |
dewey-search |
355.3/43 |
oclc_num |
898770849 |
work_keys_str_mv |
AT paulchristopher theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces AT porcheisaac theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces AT axelbandelliot theotherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces AT paulchristopher otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces AT porcheisaac otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces AT axelbandelliot otherquietprofessionalslessonsforfuturecyberforcesfromtheevolutionofspecialforces |
status_str |
n |
ids_txt_mv |
(CKB)3710000000320928 (EBL)1899339 (SSID)ssj0001402616 (PQKBManifestationID)12618729 (PQKBTitleCode)TC0001402616 (PQKBWorkID)11357602 (PQKB)10654947 (Au-PeEL)EBL1899339 (CaPaEBR)ebr11000811 (OCoLC)898770849 (MiAaPQ)EBC1899339 (EXLCZ)993710000000320928 |
carrierType_str_mv |
cr |
is_hierarchy_title |
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1796653679258894337 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05524nam a2200649 i 4500</leader><controlfield tag="001">993628446904498</controlfield><controlfield tag="005">20230803212323.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">150117t20142014caua ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8800-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8802-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000320928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001402616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)12618729</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001402616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11357602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10654947</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11000811</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898770849</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC1899339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000320928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.P385 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Paul, Christopher,</subfield><subfield code="d">1971-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The other quiet professionals :</subfield><subfield code="b">lessons for future cyber forces from the evolution of special forces /</subfield><subfield code="c">Christopher Paul, Isaac R. Porche III, Elliot Axelband.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, California :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (140 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Recognize the Precarious Value of Cyber Forces and Support Them Accordingly</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="x">Planning.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">United States.</subfield><subfield code="b">Strategic Command (2002- ).</subfield><subfield code="b">Cyber Command</subfield><subfield code="x">History.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">U.S. Special Operations Command</subfield><subfield code="x">History.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Porche, Isaac,</subfield><subfield code="d">1968-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Axelband, Elliot,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-5973-4</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:41:25 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-12-14 03:51:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350453780004498&Force_direct=true</subfield><subfield code="Z">5350453780004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350453780004498</subfield></datafield></record></collection> |