LEADER 01234nam 2200397 450 001 9910466842503321 005 20200520144314.0 010 $a1-4964-1069-6 035 $a(CKB)3840000000332696 035 $a(MiAaPQ)EBC5395965 035 $a(Au-PeEL)EBL5395965 035 $a(CaPaEBR)ebr11557897 035 $a(OCoLC)1013187330 035 $a(EXLCZ)993840000000332696 100 $a20180601d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInsights on Philippians, Colossians, Philemon /$fCharles R. Swindoll 210 1$aCarol Stream, Illinois :$cTyndale House Publishers, Inc.,$d2017. 215 $a1 online resource (231 pages) 225 0 $aSwindoll's Living Insights New Testament Commentary ;$vVolume 9 311 $a1-4143-9383-0 320 $aIncludes bibliographical references and index. 608 $aElectronic books. 676 $a227.07 700 $aSwindoll$b Charles R.$0854126 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910466842503321 996 $aInsights on Philippians, Colossians, Philemon$91960692 997 $aUNINA LEADER 02129nam 2200493 450 001 9910155227603321 005 20130717082120.0 010 $a1-61942-816-4 035 $a(CKB)3710000000973830 035 $a(MiAaPQ)EBC4787157 035 $a(EXLCZ)993710000000973830 100 $a20170130h20122012 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aFederal information security $eselect protection and control efforts /$fDavid G. Miller and Ivan I. Wilson, editors 210 1$aNew York, [New York] :$cNova,$d2012. 210 4$dİ2012 215 $a1 online resource (157 pages) $cillustrations, tables 225 1 $aDefense, Security and Strategies 300 $aIncludes index. 311 $a1-61942-771-0 327 $aInformation Security : Federal Agencies have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk -- Information Security: Federal Deposit Insurance Corporation Needs to Mitigate Control Weaknesses -- Information Security : National Nuclear Security Administration Needs to Improve Contingency Planning for Its Classified Supercomputing Operations -- Information Security : Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies. 410 0$aDefense, security and strategy series. 606 $aWireless communication systems$xSecurity measures$zUnited States 606 $aComputer security$xGovernment policy$zUnited States 606 $aInformation networks$xSecurity measures$zUnited States 606 $aData protection$zUnited States 615 0$aWireless communication systems$xSecurity measures 615 0$aComputer security$xGovernment policy 615 0$aInformation networks$xSecurity measures 615 0$aData protection 676 $a005.80973 702 $aMiller$b David G. 702 $aWilson$b Ivan I. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910155227603321 996 $aFederal information security$92884907 997 $aUNINA