LEADER 00877nam0-22002891i-450- 001 990000952030403321 035 $a000095203 035 $aFED01000095203 035 $a(Aleph)000095203FED01 035 $a000095203 100 $a20000920d1960----km-y0itay50------ba 101 0 $aeng 200 1 $aElectronic Processes in Solids$fbased on lectures given by Pierre R. Aigrain$gprepared by Roland J. Coelho, Gianni Ascarelli 210 $aMassachusetts$cMassachusetts Institute of Technology$d1960 610 0 $aStato solido 676 $a530.41 700 1$aAigrain,$bPierre$044218 702 1$aAscarelli,$bGianni 702 1$aCoelho,$bRoland J. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000952030403321 952 $a32-006$b1801$fFI1 959 $aFI1 996 $aElectronic Processes in Solids$9358023 997 $aUNINA DB $aING01 LEADER 01466oam 2200433Ia 450 001 9910695198303321 005 20240812215635.0 035 $a(CKB)5470000002366743 035 $a(OCoLC)69853450 035 $a(EXLCZ)995470000002366743 100 $a20060605d2005 ua 0 101 0 $aeng 135 $aurmn####||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuide to Malware incident prevention and handling /$fPeter Mell, Karen Kent, Joseph Nusbaum 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2005] 215 $a101 unnumbered pages $cdigital, PDF file 225 1 $aSpecial publication. ;$v800-83 300 $aTitle from title screen (viewed on May 17, 2006). 300 $a"November 2005." 606 $aComputer security 606 $aComputer viruses 606 $aSpyware (Computer software) 615 0$aComputer security. 615 0$aComputer viruses. 615 0$aSpyware (Computer software) 700 $aMell$b Peter$01381996 701 $aScarfone$b Karen$01764277 701 $aNusbaum$b Joseph$01381997 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910695198303321 996 $aGuide to Malware incident prevention and handling$94205369 997 $aUNINA