Computational methods for counterterrorism / (Record no. 240867)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 00649cam a2200193 a 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220518154441.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 090416s2009 ne ab b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783642011405 (hardcover : alk. paper) |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 519.6 |
| Item number | ARG |
| 245 00 - TITLE STATEMENT | |
| Title | Computational methods for counterterrorism / |
| Statement of responsibility, etc. | Shlomo Argamon, Howard Newton, editors. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | Dordrecht ; |
| -- | New York : |
| Name of publisher, distributor, etc. | Springer, |
| Date of publication, distribution, etc. | c2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xviii, 306 p. : |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Terrorism |
| General subdivision | Prevention |
| -- | Computer network resources. |
| 9 (RLIN) | 583 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Terrorism |
| General subdivision | Databases |
| -- | Research. |
| 9 (RLIN) | 584 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Argamon, Shlomo. |
| 9 (RLIN) | 585 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Newton, Howard. |
| 9 (RLIN) | 586 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
No items available.
