|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
1603550127 |
003 |
DE-627 |
005 |
20220605101631.0 |
007 |
tu |
008 |
911205s1990 xx ||||| t 00| ||eng c |
020 |
|
|
|a 0897790766
|9 0-89779-076-6
|
035 |
|
|
|a (DE-627)1603550127
|
035 |
|
|
|a (DE-576)026603330
|
035 |
|
|
|a (DE-599)BSZ026603330
|
035 |
|
|
|a (OCoLC)80492148
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
088 |
|
|
|a OES P 899221
|
111 |
2 |
|
|a International Carnahan Conference on Security Technology
|n 24
|d 1990
|c Lexington-Fayette, Ky.
|0 (DE-588)5086943-7
|0 (DE-627)12803338X
|0 (DE-576)194488047
|4 aut
|
245 |
1 |
0 |
|a Proceedings / 1990 Carnahan Conference on Security Technology
|b May 2 - 4, 1990
|c publ. ed.: R. William De Vore
|
264 |
|
1 |
|a Lexington, Ky.
|b Office of Engineering Services
|c 1990
|
300 |
|
|
|a 53 S.
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
583 |
1 |
|
|a Archivierung prüfen
|c 20200919
|f DE-640
|z 1
|2 pdager
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Forschungsbericht
|0 (DE-588)4155043-2
|0 (DE-627)10467444X
|0 (DE-576)209815833
|2 gnd-content
|
700 |
1 |
|
|a DeVore, R. W.
|e Hrsg.
|0 (DE-627)1238501079
|0 (DE-576)168501074
|4 edt
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 3095061552
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 1603550127
|
LOK |
|
|
|0 005 20151005160519
|
LOK |
|
|
|0 008 911205||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-21
|c DE-627
|d DE-21
|
LOK |
|
|
|0 852
|a DE-21
|
LOK |
|
|
|0 852 1
|c KB 8 E 3881
|9 00
|
LOK |
|
|
|0 935
|a krim
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|
SIG |
|
|
|a UB: KB 8 E 3881
|