01088nam a2200289 i 4500991002499879707536cr nn 008mamaa140428s1992 de | s |||| 0|eng d9783662215395b14184369-39ule_instBibl. Dip.le Aggr. Matematica e Fisica - Sez. Matematicaeng51523AMS 35A27Delort, Jean-Marc59558F.B.I. transformation[e-book] :second microlocalization and semilinear caustics /by Jean-Marc DelortBerlin :Springer,19921 online resource (vi, 102 p.)Lecture Notes in Mathematics,0075-8434 ;1522MathematicsGlobal analysis (Mathematics)Springer eBookshttp://dx.doi.org/10.1007/978-3-662-21539-5An electronic book accessible through the World Wide Web.b1418436903-03-2224-04-14991002499879707536F.B.I. transformation258920UNISALENTOle01324-04-14m@ -engde 0001676nam 2200397 a 450 991070023360332120240812223359.0(CKB)5470000002408643(OCoLC)712604017(EXLCZ)99547000000240864320110413d2008 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierTechnical guide to information security testing and assessment recommendations of the National Institute of Standards and Technology /Karen Scarfone ... [and others]Gaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,[2008]1 online resource (80 unnumbered pages) illustrationsNIST special publication ;800-115.Computer securityTitle from PDF title screen (NIST, viewed Mar. 31, 2011)."September 2008."Includes bibliographical references.Technical guide to information security testing and assessmentInformation resourcesSecurity measuresGovernment policyUnited StatesComputer securityGovernment policyUnited StatesInformation resourcesSecurity measuresGovernment policyComputer securityGovernment policyScarfone Karen1764277National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910700233603321Technical guide to information security testing and assessment4206186UNINA