*001350159
*00520171206033921.0
*007ta
*008141201s1973 xxu 000 u eng d
*00901240cam a2200409 c 4500
*019 $bl
*020 $a0137989911$qib.
*035 $a(EXLNZ-47BIBSYS_NETWORK)998340790464702201
*035 $a(NO-LaBS)14810905(bibid)
*035 $a(NO-TrBIB)834079046
*035 $a834079046-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*044 $cus
*08204$a658.478$qNoBeU$223
*0830 $a005.8$qNoBeU$223
*084 $aA:26$2utk
*084 $aA:28$2utk
*084 $aH.2.0$2acmccs
*084 $aK.4.1$2acmccs
*084 $aK.6.5$2acmccs
*084 $aL 1610$2utk
*084 $aL 164$2utk
*084 $aL 164.3$2utk
*084 $aL:10$2utk
*084 $aM:146$2utk
*084 $aQb 38x$2ubtkl/2
*084 $aUqg$2utk
*1001 $aMartin, James$0(NO-TrBIB)90082695$_23898400
*24510$aSecurity, accuracy, and privacy in computer systems$cJames Martin
*260 $aEnglewood Cliffs, N.J.$bPrentice-Hall$c1973
*300 $aXIV, 626 s.$bill.
*4900 $aPrentice-Hall series in automatic computation
*650 7$aDatasikkerhet$0(NO-TrBIB)REAL005212$2noubomn$_185599800
*650 7$aSikkerhet$0(NO-TrBIB)REAL011075$2noubomn$_185572800
*653 $adatasikkerhet$apersonvern$adatakriminalitet$aspionasje$ahackere$ahacking$_63055700
*901 $a80
*999 $aoai:nb.bibsys.no:998340790464702202$b2021-11-14T20:13:25Z$z998340790464702202
^