LEADER 01220nam0-22004331i-450- 001 990006762710403321 005 20120206123427.0 010 $a88-14-03771-X 035 $a000676271 035 $aFED01000676271 035 $a(Aleph)000676271FED01 035 $a000676271 100 $a20010426d1992----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>riforma delle società cooperative$ecommento alla Legge 31 gennaio 1992, n. 59$fa cura di A. Bassi ... [et al.] 210 $aMilano$cGiuffrè$d1992 215 $aXIV, 280 p.$d22 cm 225 1 $aLeggi commentate$v40 676 $a346.450 668 676 $a346.07 702 1$aBassi,$bAmedeo 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006762710403321 952 $aDPR 21/B-213$b11513$fDEC 952 $a13-CB-408$b4731$fDDCP 952 $aXV 03 142$b1441$fDTE 952 $aA-V-E-7$b3164 DIP.$fDDRC 952 $aCOLLEZ. 353 (40)$b18636*$fFGBC 952 $aCOLLEZ. 216 (40)$b19318$fFSPBC 959 $aDEC 959 $aFSPBC 959 $aDDRC 959 $aDTE 959 $aFGBC 959 $aDDCP 996 $aRiforma delle società cooperative$9631351 997 $aUNINA LEADER 02260oam 2200565 450 001 9910704134803321 005 20160505145049.0 035 $a(CKB)5470000002438318 035 $a(OCoLC)932012924 035 $a(EXLCZ)995470000002438318 100 $a20151210d2015 ua 0 101 0 $aeng 135 $aurbn||||a|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aVA's longstanding information security weaknesses continue to allow extensive data manipulation $ehearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Thirteenth Congress, second session, Tuesday, November 18, 2014 210 1$aWashington :$cU.S. Government Publishing Office,$d2015. 215 $a1 online resource (iii, 64 pages) 300 $aTitle from title screen (viewed on Dec. 10, 2015). 300 $aPaper version available for sale by the Superintendent of Documents, United States Government Publishing Office. 300 $a"Serial no. 113-90." 320 $aIncludes bibliographical references. 517 $aVA's longstanding information security weaknesses continue to allow extensive data manipulation 606 $aData protection$xGovernment policy$zUnited States 606 $aComputer security$xGovernment policy$zUnited States 606 $aComputer security$xGovernment policy$2fast 606 $aData protection$xGovernment policy$2fast 606 $aInformation technology$xManagement$2fast 607 $aUnited States$2fast 608 $aLegislative hearings.$2lcgft 608 $aLegislative hearings.$2fast 615 0$aData protection$xGovernment policy 615 0$aComputer security$xGovernment policy 615 7$aComputer security$xGovernment policy. 615 7$aData protection$xGovernment policy. 615 7$aInformation technology$xManagement. 801 0$bGPO 801 1$bGPO 801 2$bGPO 801 2$bSTF 801 2$bOCLCO 801 2$bCOO 801 2$bOCLCF 801 2$bOCLCO 801 2$bGPO 906 $aBOOK 912 $a9910704134803321 996 $aVA's longstanding information security weaknesses continue to allow extensive data manipulation$93541114 997 $aUNINA