LEADER 01358nam 2200457 450 001 9910816572203321 005 20230807220847.0 010 $z9781940540306 035 $a(CKB)3880000000002750 035 $a(SSID)ssj0001674938 035 $a(PQKBManifestationID)16483870 035 $a(PQKBTitleCode)TC0001674938 035 $a(PQKBWorkID)15022172 035 $a(PQKB)11200350 035 $a(MiAaPQ)EBC5349411 035 $a(WaSeSS)IndRDA00053197 035 $a(EXLCZ)993880000000002750 100 $a20180915d2015 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMicrosoft SQL Server 2012 T-SQL /$fTom Coffing, Debra Aaron 210 1$aMiddletown, Ohio :$cCoffing Publishing,$d2015. 215 $a1 online resource (1 volume) $cillustrations 225 1 $aThe Tera-Tom Genius Series ;$vBook 16 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-940540-30-5 606 $aSQL (Computer program language) 615 0$aSQL (Computer program language) 676 $a005.756 700 $aCoffing$b Tom$01598479 702 $aAaron$b Debra 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816572203321 996 $aMicrosoft SQL Server 2012 T-SQL$93920764 997 $aUNINA LEADER 02885nam 22007454a 450 001 9910970450303321 005 20251116204423.0 010 $a1-134-40029-2 010 $a0-429-23278-0 010 $a1-134-40030-6 010 $a0-203-47633-6 010 $a1-280-02547-6 010 $a0-415-30671-X 024 7 $a10.4324/9780203476338 035 $a(CKB)1000000000447804 035 $a(SSID)ssj0000289252 035 $a(PQKBManifestationID)11258649 035 $a(PQKBTitleCode)TC0000289252 035 $a(PQKBWorkID)10383693 035 $a(PQKB)11561314 035 $a(MiAaPQ)EBC200272 035 $a(Au-PeEL)EBL200272 035 $a(CaPaEBR)ebr10101248 035 $a(CaONFJC)MIL2547 035 $a(OCoLC)437060308 035 $a(OCoLC)56573403 035 $a(OCoLC)53013058 035 $a(FINmELB)ELB150879 035 $a(BIP)65643532 035 $a(BIP)13449346 035 $a(EXLCZ)991000000000447804 100 $a20030905d2004 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAsia Pacific security $evalues and identity /$fLeszek Buszynski 210 $aLondon ;$aNew York $cRoutledgeCurzon$d2004 215 $ax, 212 p 225 1 $aRoutledgeCurzon security in Asia series ;$v2 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a0-415-40616-1 311 08$a0-203-35076-6 320 $aIncludes bibliographical references (p. [170]-208) and index. 327 $aValues and identities -- Values and identity and the significance of Taiwan to China -- Values, identity and Japanese security -- The Korean peninsula -- Values, identity and US Asia Pacific policy -- Values, identity and Asia Pacific regionalism -- Values, identity and Asia Pacific Security. 330 $aThe main theme of this book is that security is not just about defence from external attack, but embraces the protection of identity and values which cultures regard as important, and which they may regard as worth fighting for. It examines Asia Pacific security from the perspective of the values and identities of the major actors in the region - C 410 0$aRoutledgeCurzon security in Asia series ;$v2. 606 $aNational characteristics, East Asian 606 $aNational characteristics, American 606 $aNational security$zEast Asian 607 $aEast Asia$xRelations$zUnited States 607 $aUnited States$xRelations$zEast Asia 615 0$aNational characteristics, East Asian. 615 0$aNational characteristics, American. 615 0$aNational security 676 $a306/.095 700 $aBuszynski$b Leszek$0879340 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910970450303321 996 $aAsia Pacific security$94467384 997 $aUNINA