REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf

上传人:ownview251 文档编号:1017421 上传时间:2019-03-21 格式:PDF 页数:386 大小:10.48MB
下载 相关 举报
REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf_第1页
第1页 / 共386页
REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf_第2页
第2页 / 共386页
REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf_第3页
第3页 / 共386页
REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf_第4页
第4页 / 共386页
REG KSC-DD-818-TR-1984 SUMMARY OF MEASUREMENTS OF KSC LAUNCH-INDUCED ENVIRONMENTAL EFFECTS (STS-1 THROUGH STS-11).pdf_第5页
第5页 / 共386页
点击查看更多>>
资源描述

1、Public Domain/Publicly Available Notice The following document contains information that is determined as in the Public Domain/Publicly Available within the purview of the International Traffic in Arms Regulations (ITAR), 22 CFR section Public Domain 120.11 and Export Administration Regulations (EAR

2、), 15 CFR 730-774, Publicly Available in Part 734.7 and Part 734.8. Information is “published” when it becomes generally accessible to the interested public in any form including the following: Through sales at newsstands or book stores, subscriptions, libraries open to the public, patents available

3、 at any patent office, distribution at a conference, meeting, seminar, trade show or exhibition, the internet and generally accessible to the public in the U.S. (Suitable for public release.) Determination: EAR 99 (NLR) EDDS # 6095 (2) Classified by: NASA/KSC Export Control Office Tel: 321-867-9209

4、Document: KSC-DD-818-TR, Summary of Measurements of KSC Launch-Induced Environmental Effects (STS-1 through STS11), June 1984, Engineering Development Directorate DATE: 03/20/06 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for R

5、esaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleN

6、o reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo repr

7、oduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproducti

8、on or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or

9、networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networ

10、king permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking p

11、ermitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitt

12、ed without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted wit

13、hout license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-

展开阅读全文
相关资源
猜你喜欢
  • BS ISO IEC 27018-2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PI.pdf BS ISO IEC 27018-2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PI.pdf
  • BS ISO IEC 27031-2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity《信息技术 安全技术 业务连续性的.pdf BS ISO IEC 27031-2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity《信息技术 安全技术 业务连续性的.pdf
  • BS ISO IEC 27032-2012 Information technology Security techniques Guidelines for cybersecurity《信息技术 安全技术 网络安全指南》.pdf BS ISO IEC 27032-2012 Information technology Security techniques Guidelines for cybersecurity《信息技术 安全技术 网络安全指南》.pdf
  • BS ISO IEC 27033-1-2015 Information technology Security techniques Network security Overview and concepts《信息技术 保密技术 网络安全性 概念和概述》.pdf BS ISO IEC 27033-1-2015 Information technology Security techniques Network security Overview and concepts《信息技术 保密技术 网络安全性 概念和概述》.pdf
  • BS ISO IEC 27033-2-2012 Information technology Security techniques Guidelines for the design and implementation of network security《信息技术 保密技术 网络安全 网络安全设计和实施导则》.pdf BS ISO IEC 27033-2-2012 Information technology Security techniques Guidelines for the design and implementation of network security《信息技术 保密技术 网络安全 网络安全设计和实施导则》.pdf
  • BS ISO IEC 27033-3-2011 Information technology Security techniques Network security Reference networking scenarios Threats design techniques and control issues《信息技术 安全技术 网.pdf BS ISO IEC 27033-3-2011 Information technology Security techniques Network security Reference networking scenarios Threats design techniques and control issues《信息技术 安全技术 网.pdf
  • BS ISO IEC 27033-4-2014 Information technology Security techniques Network security Securing communications between networks using security gateways《信息技术 安全技术 网络安全 使用安全网关的.pdf BS ISO IEC 27033-4-2014 Information technology Security techniques Network security Securing communications between networks using security gateways《信息技术 安全技术 网络安全 使用安全网关的.pdf
  • BS ISO IEC 27033-5-2013 Information technology Security techniques Network security Securing communications across networks using Virtual Private Networks (VPNs)《信息技术 安全技术.pdf BS ISO IEC 27033-5-2013 Information technology Security techniques Network security Securing communications across networks using Virtual Private Networks (VPNs)《信息技术 安全技术.pdf
  • BS ISO IEC 27033-6-2016 Information technology Security techniques Network security Securing wireless IP network access《信息技术 安全技术 网络安全 无线IP网络接入安全》.pdf BS ISO IEC 27033-6-2016 Information technology Security techniques Network security Securing wireless IP network access《信息技术 安全技术 网络安全 无线IP网络接入安全》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1