LEADER 01910nam 2200469Ka 450 001 9910696987903321 005 20090624081453.0 035 $a(CKB)5470000002383009 035 $a(OCoLC)407019708 035 $a(OCoLC)527635274 035 $a(EXLCZ)995470000002383009 100 $a20090624d2008 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecommendation for EAP methods used in wireless network access authentication$b[electronic resource] /$fKatrin Hoeper and Lily Chen 205 $aDraft. 210 1$a[Gaithersburg, Md.] :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2008] 215 $a50 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-120.$aComputer security 300 $aTitle from title screen (viewed on June 23, 2009). 300 $a"December 2008." 320 $aIncludes bibliographical references. 410 0$aNIST special publication ;$v800-120. 410 0$aNIST special publication.$pComputer security. 606 $aAuthentication$xStandards$xGovernment policy$zUnited States 606 $aWireless communication systems$xStandards$xGovernment policy$zUnited States 606 $aComputer network protocols$xGovernment policy$zUnited States 615 0$aAuthentication$xStandards$xGovernment policy 615 0$aWireless communication systems$xStandards$xGovernment policy 615 0$aComputer network protocols$xGovernment policy 700 $aHoeper$b Katrin$01401197 701 $aChen$b Lily$01396971 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696987903321 996 $aRecommendation for EAP methods used in wireless network access authentication$93469571 997 $aUNINA LEADER 01768nam 2200577 450 001 9910829158303321 005 20200520144314.0 010 $a2-84450-865-0 035 $a(CKB)3240000000129424 035 $a(SSID)ssj0000712373 035 $a(PQKBManifestationID)12305422 035 $a(PQKBTitleCode)TC0000712373 035 $a(PQKBWorkID)10644600 035 $a(PQKB)10654705 035 $a(MiAaPQ)EBC4412956 035 $a(Au-PeEL)EBL4412956 035 $a(CaPaEBR)ebr11293092 035 $a(OCoLC)962151738 035 $a(PPN)187276323 035 $a(EXLCZ)993240000000129424 100 $a20161108h20102010 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aLes chemins des proies $eune histoire de la flibuste /$fJean-Jacques Seymour 210 1$aMatoury, Guyane :$cIbis Rouge E?ditions,$d2010. 210 4$dİ2010 215 $a1 online resource (300 pages) 225 1 $aCollection Espace outre-mer 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a2-84450-365-9 320 $aIncludes bibliographical references. 410 0$aCollection Espace outre-mer. 606 $aBuccaneers 606 $aPirates$zCaribbean Area$xHistory$y16th century 606 $aPirates$zCaribbean Area$xHistory$y17th century 610 $aMaritime history$aPiracy$aCaribbean$a16th-17th centuries 615 0$aBuccaneers. 615 0$aPirates$xHistory 615 0$aPirates$xHistory 676 $a972.903 700 $aSeymour$b Jean-Jacques$01630906 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910829158303321 996 $aLes chemins des proies$93969452 997 $aUNINA