Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Fort George G. Meade, Maryland
Center for Cryptologic History, National Security Agency
2000
|
Schriftenreihe: | United States cryptologic history. Series V. Early postwar period, 1945-1952
Volume 4 |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/01120100046SI/?ar |
Zusammenfassung: | Information about Signal Intelligence and the Pusan Perimeter. |
Beschreibung: | "CCH-N63-00-02"--Cover. - Includes bibliographical references (page 18). - Description based on online resource; title from title page (Safari, viewed April 18, 2016) |
Umfang: | 1 Online-Ressource (18 pages) illustrations, color map. |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051700956 | ||
003 | DE-627-1 | ||
005 | 20240228120059.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2000 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)051700956 | ||
035 | |a (DE-599)KEP051700956 | ||
035 | |a (ORHE)01120100046SI | ||
035 | |a (DE-627-1)051700956 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 951.9042 | |
100 | 1 | |a Frahm, Jill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a So power can be brought into play |b SIGINT and the Pusan Perimeter |c Jill Frahm |
246 | 3 | 3 | |a SIGINT and the Pusan Perimeter |
264 | 1 | |a Fort George G. Meade, Maryland |b Center for Cryptologic History, National Security Agency |c 2000 | |
300 | |a 1 Online-Ressource (18 pages) |b illustrations, color map. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a United States cryptologic history. Series V. Early postwar period, 1945-1952 |v Volume 4 | |
500 | |a "CCH-N63-00-02"--Cover. - Includes bibliographical references (page 18). - Description based on online resource; title from title page (Safari, viewed April 18, 2016) | ||
520 | |a Information about Signal Intelligence and the Pusan Perimeter. | ||
650 | 0 | |a Korean War, 1950-1953 |x Military intelligence | |
650 | 0 | |a Korean War, 1950-1953 |x Cryptography | |
650 | 4 | |a Korean War ; (1950-1953) | |
650 | 4 | |a 1950-1953 | |
650 | 4 | |a Guerre de Corée, 1950-1953 ; Service des renseignements militaires | |
650 | 4 | |a Guerre de Corée, 1950-1953 ; Cryptographie | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Military intelligence | |
710 | 2 | |a United States. |b National Security Agency/Central Security Service. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/01120100046SI/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051700956 |
---|---|
_version_ | 1835903157917450240 |
adam_text | |
any_adam_object | |
author | Frahm, Jill |
author_corporate | United States. National Security Agency/Central Security Service |
author_corporate_role | ctb |
author_facet | Frahm, Jill United States. National Security Agency/Central Security Service |
author_role | aut |
author_sort | Frahm, Jill |
author_variant | j f jf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051700956 (DE-599)KEP051700956 (ORHE)01120100046SI |
dewey-full | 951.9042 |
dewey-hundreds | 900 - History & geography |
dewey-ones | 951 - China and adjacent areas |
dewey-raw | 951.9042 |
dewey-search | 951.9042 |
dewey-sort | 3951.9042 |
dewey-tens | 950 - History of Asia |
discipline | Geschichte |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01959cam a22004572c 4500</leader><controlfield tag="001">ZDB-30-ORH-051700956</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120059.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2000 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051700956</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051700956</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)01120100046SI</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051700956</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">951.9042</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Frahm, Jill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">So power can be brought into play</subfield><subfield code="b">SIGINT and the Pusan Perimeter</subfield><subfield code="c">Jill Frahm</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">SIGINT and the Pusan Perimeter</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Fort George G. Meade, Maryland</subfield><subfield code="b">Center for Cryptologic History, National Security Agency</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (18 pages)</subfield><subfield code="b">illustrations, color map.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">United States cryptologic history. Series V. Early postwar period, 1945-1952</subfield><subfield code="v">Volume 4</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"CCH-N63-00-02"--Cover. - Includes bibliographical references (page 18). - Description based on online resource; title from title page (Safari, viewed April 18, 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information about Signal Intelligence and the Pusan Perimeter.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Korean War, 1950-1953</subfield><subfield code="x">Military intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Korean War, 1950-1953</subfield><subfield code="x">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Korean War ; (1950-1953)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">1950-1953</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerre de Corée, 1950-1953 ; Service des renseignements militaires</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerre de Corée, 1950-1953 ; Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military intelligence</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">United States.</subfield><subfield code="b">National Security Agency/Central Security Service.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/01120100046SI/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051700956 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:14:49Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (18 pages) illustrations, color map. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Center for Cryptologic History, National Security Agency |
record_format | marc |
series2 | United States cryptologic history. Series V. Early postwar period, 1945-1952 |
spelling | Frahm, Jill VerfasserIn aut So power can be brought into play SIGINT and the Pusan Perimeter Jill Frahm SIGINT and the Pusan Perimeter Fort George G. Meade, Maryland Center for Cryptologic History, National Security Agency 2000 1 Online-Ressource (18 pages) illustrations, color map. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier United States cryptologic history. Series V. Early postwar period, 1945-1952 Volume 4 "CCH-N63-00-02"--Cover. - Includes bibliographical references (page 18). - Description based on online resource; title from title page (Safari, viewed April 18, 2016) Information about Signal Intelligence and the Pusan Perimeter. Korean War, 1950-1953 Military intelligence Korean War, 1950-1953 Cryptography Korean War ; (1950-1953) 1950-1953 Guerre de Corée, 1950-1953 ; Service des renseignements militaires Guerre de Corée, 1950-1953 ; Cryptographie Cryptography Military intelligence United States. National Security Agency/Central Security Service. MitwirkendeR ctb |
spellingShingle | Frahm, Jill So power can be brought into play SIGINT and the Pusan Perimeter Korean War, 1950-1953 Military intelligence Korean War, 1950-1953 Cryptography Korean War ; (1950-1953) 1950-1953 Guerre de Corée, 1950-1953 ; Service des renseignements militaires Guerre de Corée, 1950-1953 ; Cryptographie Cryptography Military intelligence |
title | So power can be brought into play SIGINT and the Pusan Perimeter |
title_alt | SIGINT and the Pusan Perimeter |
title_auth | So power can be brought into play SIGINT and the Pusan Perimeter |
title_exact_search | So power can be brought into play SIGINT and the Pusan Perimeter |
title_full | So power can be brought into play SIGINT and the Pusan Perimeter Jill Frahm |
title_fullStr | So power can be brought into play SIGINT and the Pusan Perimeter Jill Frahm |
title_full_unstemmed | So power can be brought into play SIGINT and the Pusan Perimeter Jill Frahm |
title_short | So power can be brought into play |
title_sort | so power can be brought into play sigint and the pusan perimeter |
title_sub | SIGINT and the Pusan Perimeter |
topic | Korean War, 1950-1953 Military intelligence Korean War, 1950-1953 Cryptography Korean War ; (1950-1953) 1950-1953 Guerre de Corée, 1950-1953 ; Service des renseignements militaires Guerre de Corée, 1950-1953 ; Cryptographie Cryptography Military intelligence |
topic_facet | Korean War, 1950-1953 Military intelligence Korean War, 1950-1953 Cryptography Korean War ; (1950-1953) 1950-1953 Guerre de Corée, 1950-1953 ; Service des renseignements militaires Guerre de Corée, 1950-1953 ; Cryptographie Cryptography Military intelligence |
work_keys_str_mv | AT frahmjill sopowercanbebroughtintoplaysigintandthepusanperimeter AT unitedstatesnationalsecurityagencycentralsecurityservice sopowercanbebroughtintoplaysigintandthepusanperimeter AT frahmjill sigintandthepusanperimeter AT unitedstatesnationalsecurityagencycentralsecurityservice sigintandthepusanperimeter |