LEADER 02019nam 2200325 450 001 9910437656803321 005 20230811090457.0 035 $a(CKB)3190000000025532 035 $a(NjHacI)993190000000025532 035 $a(EXLCZ)993190000000025532 100 $a20230811d1967 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIsraeli Criminal Procedure Law /$fGerhard O. W. Mueller 210 1$aLittleton, Colo. :$cFred B. Rothman,$d1967. 215 $a1 online resource (ix + 66 pages) 330 $aThe Criminal Procedure Law, enacted in July 1965, has major divisions that cover general provisions, the parties and their representatives, arrest and release, proceedings prior to trial, proceedings at the trial, and appeal. The objectives of the code are the codification of the rules of procedure, the unification of procedure in the various courts of criminal jurisdiction, and reform in certain matters of criminal procedure. Proceedings are accusatory rather than inquisitory, and the judge takes little active part in the procedures. They are instituted by filing a statement of charge and conducted by police officers or attorneys of the State Attorney's Department. The accused has the benefit of the presumption of innocence and the right to remain silent; confessions are admissible only if made freely and voluntarily. The code makes no provision for preliminary inquiry; the accused is required to admit or deny facts instead of pleading guilty or not guilty. The code provides for the possibility of trial in absentia. The right of discovery extends to charges of misdemeanors. 606 $aNoncitizen criminals 615 0$aNoncitizen criminals. 676 $a364.3086912 700 $aMueller$b Gerhard O. W.$0224964 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910437656803321 996 $aIsraeli Criminal Procedure Law$93420908 997 $aUNINA LEADER 01733aam 2200457I 450 001 9910710508403321 005 20131209032733.0 024 8 $aGOVPUB-C13-1f12dd3036c412157adfc8fa96fed56b 035 $a(CKB)5470000002478217 035 $a(OCoLC)864829293 035 $a(EXLCZ)995470000002478217 100 $a20131209d2013 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aTaxonomic rules for password policies $etranslating the informal to the formal language /$fKevin Killourhy; Yee-Yin Choong; Mary Theofanos 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d2013. 215 $a1 online resource (21 pages) $cillustrations (black and white) 225 1 $aNISTIR ;$v7970 300 $a"December 2013." 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page (viewed December 9, 2013). 320 $aIncludes bibliographical references. 517 $aTaxonomic rules for password policies 606 $aComputers$xAccess control$xPasswords 606 $aTaxonomy 615 0$aComputers$xAccess control$xPasswords. 615 0$aTaxonomy. 700 $aKillourhy$b Kevin$01401419 701 $aChoong$b Yee-Yin$01388781 701 $aKillourhy$b Kevin$01401419 701 $aTheofanos$b Mary$01388783 712 02$aInformation Technology Laboratory (National Institute of Standards and Technology) 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910710508403321 996 $aTaxonomic rules for password policies$93470180 997 $aUNINA