This book details how criminals, terrorists, and enemy governments attempt to use technology against the United States, and how we can counter this threat.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
1232200 | 4908799 | 2167 | 609440 | 806018 | FAMB | 177 | FAMB106027 | 363.32 GRA | 363.32 | 1581465224 | 1708963493 |
2523392 | 6037981 | 2128 | 609440 | 806018 | SOS | 418 | SOS0104391 | 363.325 GRA | 363.32 | 1637782573 | 1695044385 |
3774644 | 7090458 | 2109 | 609440 | 806018 | PMM | 361 | PMM0026332 | 363.325 GRA | 363.32 | 1695044385 | 1695044385 |