|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn946944225 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mnu|||||||| |
008 |
160419s2000 mduab ob f000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d KSU
|d DEBBG
|d CEF
|d WYU
|d OCL
|d GPO
|d TOH
|d OCLCQ
|d LVT
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1164071605
|a 1182541020
|a 1182635537
|a 1302277612
|
029 |
1 |
|
|a DEBBG
|b BV043969247
|
029 |
1 |
|
|a GBVCP
|b 876245483
|
029 |
1 |
|
|a DEBSZ
|b 485797615
|
029 |
1 |
|
|a AU@
|b 000067074208
|
035 |
|
|
|a (OCoLC)946944225
|z (OCoLC)1164071605
|z (OCoLC)1182541020
|z (OCoLC)1182635537
|z (OCoLC)1302277612
|
037 |
|
|
|a CL0500000733
|b Safari Books Online
|
043 |
|
|
|a a-kr---
|
050 |
|
4 |
|a DS918
|
074 |
|
|
|a 0306 (online)
|
082 |
0 |
4 |
|a 951.9042
|q OCoLC
|
086 |
0 |
|
|a D 1.2:P 97/3
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Frahm, Jill,
|e author.
|
245 |
1 |
0 |
|a So power can be brought into play :
|b SIGINT and the Pusan Perimeter /
|c Jill Frahm.
|
246 |
3 |
0 |
|a SIGINT and the Pusan Perimeter
|
264 |
|
1 |
|a Fort George G. Meade, Maryland :
|b Center for Cryptologic History, National Security Agency,
|c 2000.
|
300 |
|
|
|a 1 online resource (18 pages) :
|b illustrations, color map.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a United States cryptologic history. Series V. Early postwar period, 1945-1952 ;
|v Volume 4
|
500 |
|
|
|a "CCH-N63-00-02"--Cover.
|
588 |
|
|
|a Description based on online resource; title from title page (Safari, viewed April 18, 2016).
|
504 |
|
|
|a Includes bibliographical references (page 18).
|
520 |
|
|
|a Information about Signal Intelligence and the Pusan Perimeter.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Korean War, 1950-1953
|x Military intelligence.
|
650 |
|
0 |
|a Korean War, 1950-1953
|x Cryptography.
|
650 |
|
6 |
|a Guerre de Corée, 1950-1953
|x Service des renseignements militaires.
|
650 |
|
6 |
|a Guerre de Corée, 1950-1953
|x Cryptographie.
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Military intelligence.
|2 fast
|0 (OCoLC)fst01021270
|
647 |
|
7 |
|a Korean War
|d (1950-1953)
|2 fast
|0 (OCoLC)fst00988609
|
648 |
|
7 |
|a 1950-1953
|2 fast
|
710 |
1 |
|
|a United States.
|b National Security Agency/Central Security Service.
|b Center for Cryptologic History,
|e issuing body.
|
776 |
0 |
8 |
|i Print version:
|a Frahm, Jill.
|t So power can be brought into play.
|d [Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, 2000
|w (OCoLC)46486378
|
776 |
0 |
8 |
|i Microfiche version:
|a Frahm, Jill.
|t So power can be brought into play.
|d [Fort George G. Meade, Md.] : Center for Cryptologic History, National Security Agency, 2000
|w (OCoLC)51023847
|
830 |
|
0 |
|a United States cryptologic history.
|n Series 5,
|p Early postwar period, 1945-1952 ;
|v v. 4.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/01120100046SI/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|