LEADER 00800nam0-22002651i-450- 001 990001216600403321 035 $a000121660 035 $aFED01000121660 035 $a(Aleph)000121660FED01 035 $a000121660 100 $a20000920d1933----km-y0itay50------ba 101 0 $aeng 200 1 $a<>Méthode du champ self-consistent.$fde Brillouin L. 210 $aParis$cHermann$d1933. 225 1 $aActualités Scientifiques et Industrielles - Exposés sur la Théorie des Quanta 300 $aVol. 71 fasc.III. 700 1$aBrillouin,$bLéon$f<1889-1969>$0340638 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001216600403321 952 $a12-I-6$b173$fMA1 959 $aMA1 996 $aMéthode du champ self-consistent$9342931 997 $aUNINA DB $aING01 LEADER 01440nam 2200397z- 450 001 9910689321203321 005 20161209075427.0 035 $a(CKB)5860000000021898 035 $a(BIP)007469196 035 $a(EXLCZ)995860000000021898 100 $a20220406c2000uuuu -u- - 101 0 $aeng 200 10$aEncryption security in a high tech era $ehearing before the Subcommittee on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, first session, Tuesday, May 18, 1999 210 $cWashington: U.S. G.P.O. 215 $a1 online resource (iii, 60 p.) 311 $a0-16-060699-3 517 $aEncryption security in a high tech era 606 $aData encryption (Computer science)$zUnited States 606 $aExport controls$zUnited States 606 $aComputer security$zUnited States 606 $aNational security$zUnited States 610 $aData encryption (computer science) 610 $aExport controls 610 $aComputer security 610 $aNational security 610 $aComputers 610 $aLaw 610 $aPolitical science 615 0$aData encryption (Computer science) 615 0$aExport controls 615 0$aComputer security 615 0$aNational security 906 $aBOOK 912 $a9910689321203321 996 $aEncryption security in a high tech era$93144074 997 $aUNINA