Record ID | marc_nuls/NULS_PHC_180925.mrc:336235687:1724 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:336235687:1724?format=raw |
LEADER: 01724cam 2200409 a 4500
001 9920123630001661
005 20150423124527.0
008 080422s2008 caua b 000 0 eng
010 $a 2008018381
020 $a9780833044679 (pbk. : alk. paper)
020 $a0833044672 (pbk. : alk. paper)
035 $a(CSdNU)u369681-01national_inst
035 $a(OCoLC)227205711
035 $a(OCoLC)227205711
035 $a(OCoLC)227205711
040 $aDLC$cDLC$dYDXCP$dBAKER$dBTCTA$dTJC$dIXA$dBWX$dOrLoB-B
043 $an-us---
049 $aCNUM
050 00 $aHV6773$b.N38 2008
082 00 $a364.16/80973$222
245 00 $aNational computer security survey :$bfinal methodology /$cLois M. Davis ... [et al.].
260 $aSanta Monica, CA :$bRand Corp.,$c2008.
300 $axiv, 75 p. :$bill. ;$c28 cm.
490 1 $aTechnical report
500 $a"Prepared for the Bureau of Justice Statistics."
500 $a"Rand Safety and Justice."
504 $aIncludes bibliographical references.
505 0 $aCh. 1. Introduction -- Ch. 2. Frame definition -- Ch. 3. Sampling strategy -- Ch. 4. Survey methods and fielding -- Ch. 5. Weighting methodology and nonresponse analysis -- App. A. Range and edit checks and other data cleaning procedures -- App. B. Questionnaire.
650 0 $aComputer crimes$zUnited States.
650 0 $aComputer crimes$zUnited States$vStatistics.
650 0 $aComputer security$zUnited States$xEvaluation.
700 1 $aDavis, Lois M.
830 0 $aTechnical report.
947 $fSOET-CIS$hCIRCSTACKS$p$22.80$q1
949 $aHV 6773 .N38 2008$i31786102392666
994 $a92$bCNU
999 $aHV 6773 .N38 2008$wLC$c1$i31786102392666$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u10/13/2009