|
|
|
|
LEADER |
02687nam a2200529 a 4500 |
001 |
57766474 |
003 |
OCoLC |
005 |
20050317091728.3 |
008 |
050301s2004 waua b f000 0 eng c |
020 |
|
|
|a 0160742188
|
035 |
|
|
|a (GPO)apn2005-005392
|
037 |
|
|
|a 552-070-32255-8
|b GPO
|
040 |
|
|
|a GPO
|b eng
|c GPO
|
042 |
|
|
|a pcc
|
043 |
|
|
|a n-us---
|
049 |
|
|
|a COMN
|
050 |
1 |
4 |
|a KF27
|b .G679 2004g
|
074 |
|
|
|a 1016-B (online)
|
086 |
0 |
|
|a Y 4.G 74/7:C 99/4
|
088 |
|
|
|a Serial no. 108-232 (United States. Congress. House. Committee on Government Reform)
|
110 |
1 |
|
|a United States.
|b Congress.
|b House.
|b Committee on Government Reform.
|b Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census.
|
245 |
1 |
0 |
|a Who might be lurking at your cyber front door? Is your system really secure? :
|b strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004.
|
264 |
|
1 |
|a Washington :
|b U.S. G.P.O. :
|b For sale by the Supt. of Docs., U.S. G.P.O.,
|c 2004.
|
300 |
|
|
|a iii, 170 pages :
|b illustrations ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia.
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier.
|
500 |
|
|
|a Distributed to some depository libraries in microfiche.
|
500 |
|
|
|a Shipping list no.: 2005-0086-P.
|
530 |
|
|
|a Also available via Internet from the GPO Access web site. Address as of 3/1/05: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108%5Fhouse%5Fhearings&docid=f:96992.pdf; current access available via PURL.
|
504 |
|
|
|a Includes bibliographical references.
|
500 |
|
|
|a "Serial no. 108-232."
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States.
|
650 |
|
0 |
|a Computer security
|z United States.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
907 |
|
|
|a .b25542047
|b cug
|c -
|d 050310
|e 230523
|
998 |
|
|
|a cug
|b 060904
|c m
|d a
|e -
|f eng
|g wau
|h 0
|i 0
|
902 |
|
|
|a 060630
|
948 |
|
|
|a MARCIVE Comp, in 2022.12
|
948 |
|
|
|a MARCIVE August, 2017
|
948 |
|
|
|a MARCIVE extract Aug 5, 2017
|
994 |
|
|
|a 92
|b COM
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2022.12
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2017.08
|
995 |
|
|
|a OCLC offline update by CMU
|
989 |
|
|
|a Y 4.G 74/7:C 99/4
|d cusgh
|e - -
|f - -
|g -
|h 0
|i 0
|j 67
|k 050317
|l $0.00
|m
|n - -
|o -
|p 0
|q 0
|t 0
|x 0
|1 .i44403781
|u http://purl.access.gpo.gov/GPO/LPS58365
|