LEADER 01531nam 2200409 n 450 001 996391158303316 005 20221108034302.0 035 $a(CKB)1000000000658072 035 $a(EEBO)2240905441 035 $a(UnM)99864406 035 $a(EXLCZ)991000000000658072 100 $a19931109d1648 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA brief plat-form of that government which is called Presbyterial$b[electronic resource] /$fBy William Ley minister of the Word at Charlwood in Surrey 210 $aLondon $cPrinted by William du-guard, and are to be sold by Nathanae?l Brooks, at the Sign of the Angel in Corn-hill$d1648 215 $a[12], 18, [2] p 300 $aThe final leaf is blank. 300 $aRunning title: A brief plat-form of Presbterial government. 300 $aAnnotation on Thomason copy: "Aug: 5th". 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 606 $aPresbyterianism$vEarly works to 1800 606 $aChurch$xAuthority$vEarly works to 1800 607 $aGreat Britain$xHistory$yCivil War, 1642-1649$vEarly works to 1800 615 0$aPresbyterianism 615 0$aChurch$xAuthority 700 $aLey$b William$fb. 1620 or 21.$01004803 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bUk-ES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996391158303316 996 $aA brief plat-form of that government which is called Presbyterial$92308696 997 $aUNISA LEADER 02403nam 2200433 450 001 9910162917303321 005 20180224204703.0 010 $a1-4422-4839-4 035 $a(CKB)3710000001045131 035 $a(MiAaPQ)EBC4800073 035 $a(EXLCZ)993710000001045131 100 $a20170217h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aAmerican national security policy $eauthorities, institutions, and cases /$fJohn T. Fishel 210 1$aLanham, Maryland :$cRowman & Littlefield,$d2017. 210 4$dİ2017 215 $a1 online resource (284 pages) 311 $a1-4422-4838-6 311 $a1-4422-4837-8 320 $aIncludes bibliographical references and index. 327 $aA touch of theory -- A practitioners guide to realism -- The practitioners' textbook -- Legal authorities -- National security organizations -- The National Security Council process -- Defense planning systems -- The cases -- Panama: national security policy from below -- "I love it when a plan comes together" -- Adventures in peace enforcement: the Somalia tragedy -- The "intervasion" of haiti -- "Some damned foolish thing in the Balkans" -- 9/11 and the invasion of Afghanistan -- Iraq: snatching defeat from the jaws of victory and victory from the jaws of defeat -- The Afghanistan surge: Obama's finest hour? -- Some conclusions -- How national security policy is really made: lessons from the cases. 330 $a"Security policy is a key factor not only of domestic politics in the U.S., but also of foreign relations and global security. This text sets to explain the process of security policy making in the United States by looking at all the elements that shape it, from institutions and legislation to policymakers themselves and historical precedents."--Provided by publisher. 606 $aNational security$zUnited States 607 $aUnited States$xMilitary policy$xDecision making$vCase studies 607 $aUnited States$xForeign relations$xDecision making$vCase studies 615 0$aNational security 676 $a355.033073 700 $aFishel$b John T.$01249266 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910162917303321 996 $aAmerican national security policy$92895090 997 $aUNINA LEADER 02094nam 22004693 450 001 9911008944803321 005 20231209060231.0 010 $a9789201179234 010 $a9201179235 035 $a(MiAaPQ)EBC30999725 035 $a(Au-PeEL)EBL30999725 035 $a(Exl-AI)30999725 035 $a(CKB)29287173300041 035 $a(OCoLC)1412624320 035 $a(EXLCZ)9929287173300041 100 $a20231209d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUse of Periodic Safety Review for Long Term Operation of Nuclear Power Plants 205 $a1st ed. 210 1$aVienna :$cInternational Atomic Energy Agency,$d2024. 210 4$dİ2023. 215 $a1 online resource (132 pages) 225 1 $aSafety Reports Series No Series ;$vv.121 311 08$aPrint version: IAEA Use of Periodic Safety Review for Long Term Operation of Nuclear Power Plants Vienna : International Atomic Energy Agency,c2024 9789201178237 330 $aThis text concerns the technical requirements and dependencies involved in implementing cryptographic algorithms, specifically highlighting the necessity of the PyCryptodome library for the AES (Advanced Encryption Standard) algorithm. The content likely addresses software development, cryptography, and security protocols, providing essential information for developers and IT professionals who implement secure systems. The primary audience includes technical professionals and students in computer science or cybersecurity fields.$7Generated by AI. 410 0$aSafety Reports Series No Series 606 $aCryptography$7Generated by AI 606 $aComputer security$7Generated by AI 615 0$aCryptography 615 0$aComputer security 700 $aIAEA$01594159 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911008944803321 996 $aUse of Periodic Safety Review for Long Term Operation of Nuclear Power Plants$94395029 997 $aUNINA