{"leader":"00678naa#a2200169#i#450#","fields":[{"001":"EN\\\\bibl\\20492"},{"005":"20240510022312.5"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"2219-0767"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20180330b2018####ek#y0engy0150####ca"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"ANALYSIS OF METHODS TO ASSESS THREATS UNAUTHORIZED ACCESS TO INFORMATION SYSTEMS OF SPECIAL PURPOSE"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Voronezh"},{"c":"FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov"},{"d":"2018"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"6 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"675":{"ind1":"#","ind2":"#","subfields":[{"a":"\u00d0\u00a0\u00d0\u00b0\u00d0\u00b7\u00d0\u00bb\u00d0\u00b8\u00d1\u0087\u00d0\u00bd\u00d1\u008b\u00d0\u00b5 \u00d0\u00be\u00d1\u0082\u00d1\u0080\u00d0\u00b0\u00d1\u0081\u00d0\u00bb\u00d0\u00b8 \u00d0\u00bf\u00d1\u0080\u00d0\u00be\u00d0\u00bc\u00d1\u008b\u00d1\u0088\u00d0\u00bb\u00d0\u00b5\u00d0\u00bd\u00d0\u00bd\u00d0\u00be\u00d1\u0081\u00d1\u0082\u00d0\u00b8 \u00d0\u00b8 \u00d1\u0080\u00d0\u00b5\u00d0\u00bc\u00d0\u00b5\u00d1\u0081\u00d0\u00bb\u00d0\u00b0. 68"},{"z":""}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Zmeev"},{"g":"A. "}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"naukaru.ru"},{"u":""}]}}]}