Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:519329248:1425 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:519329248:1425?format=raw |
LEADER: 01425nam a2200349Ia 4500
001 013463448-9
005 20121115021546.0
006 m o d f
008 121001s2011 mdu ob f000 0 eng d
035 0 $aocn811564868
035 $a(FDLP)ocn811564868
040 $aGPO$cGPO
043 $an-us---
074 $a0247 (online)
086 0 $aC 13.10:800-125
100 1 $aKent, Karen$q(Karen Ann)
245 10 $aGuide to security for full virtualization technologies$h[electronic resource] :$brecommendations of the National Institute of Standards and Technology /$cKaren Scarfone, Murugiah Souppaya, Paul Hoffman.
260 $aGaithersburg, MD :$bU.S. Dept. of Commerce, National Institute of Standards and Technology,$c[2011]
300 $a1 online resource ([35] p.)
490 1 $aNIST special publication ;$v800-125.$aComputer security
500 $aTitle from PDF title screen (viewed Sept. 27, 2012).
500 $a"January 2011."
504 $aIncludes bibliographical references.
650 0 $aComputer software$xComputer simulation$xStandards$zUnited States.
650 0 $aComputer security$xStandards$zUnited States.
700 1 $aSouppaya, Murugiah.
700 1 $aHoffman, Paul.
710 2 $aNational Institute of Standards and Technology (U.S.)
830 0 $aNIST special publication ;$v800-125.
830 0 $aNIST special publication.$pComputer security.
988 $a20121115
906 $0OCLC