Describes the skills necessary to pursue a career as a information security analyst, and examines the type of work they do.
| hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 875049 | 4603456 | 2292 | 87756 | 141365 | BRFR | 113 | BREL068552 | 005.8 MAR | 5.8 | 1579893772 | 1736518457 |
| 2454140 | 5976133 | 2416 | 87756 | 141365 | RCS | 391 | RCS0F01220 | 005.8023 MAR | 5.8 | 1637782573 | 1736800991 |
| 2467693 | 5987595 | 2417 | 87756 | 141365 | ROES | 400 | RME0091346 | 005.8023 MAR | 5.8 | 1637782573 | 1736800991 |
| 3329104 | 6724962 | 1582 | 87756 | 141365 | 46 | 131 | T 4620702 | 005.8 MAR | 5.8 | 1640729255 | 1640729255 |
| 3446936 | 6824366 | 1593 | 87756 | 141365 | Edison | 169 | 700126399 | 621.382 MAR | 621.38 | 1640729255 | 1640729255 |