ARMY MIL-PRF-32269 VALID NOTICE 1-2013 Perforated Homogeneous Steel Armor.pdf

上传人:arrownail386 文档编号:447127 上传时间:2018-11-16 格式:PDF 页数:1 大小:9.63KB
下载 相关 举报
ARMY MIL-PRF-32269 VALID NOTICE 1-2013 Perforated Homogeneous Steel Armor.pdf_第1页
第1页 / 共1页
亲,该文档总共1页,全部预览完了,如果喜欢就下载吧!
资源描述

1、PERFORMANCE SPECIFICATIONPerforated Homogeneous Steel ArmorMIL-PRF-32269, dated 18-Oct-2007, has been reviewed anddetermined to be valid for use in acquisition.Reviewer Activities: Army - AR, AT, AV, MIDLA - ISNOTICE OFVALIDATIONINCH-POUNDMIL-PRF-32269NOTICE 103-Dec-2013NOTE: The activities above we

2、re interested in this document asof the date of this document. Since organizations andresponsibilities can change, you should verify the currency ofthe information above using the ASSIST Online database athttps:/assist.dla.mil.AMSC N/A FSC 9515Custodians:Army - MRPreparing Activity:Army - MRProvided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-

展开阅读全文
相关资源
猜你喜欢
  • ANSI INCITS ISO IEC 9637-1-1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding Part 1 Characte.pdf ANSI INCITS ISO IEC 9637-1-1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding Part 1 Characte.pdf
  • ANSI INCITS ISO IEC 9637-2-1992 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding - Part 2 Binary.pdf ANSI INCITS ISO IEC 9637-2-1992 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding - Part 2 Binary.pdf
  • ANSI INCITS ISO IEC 9638-3-1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Language Bindings - Part 3 Ada (Ado.pdf ANSI INCITS ISO IEC 9638-3-1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Language Bindings - Part 3 Ada (Ado.pdf
  • ANSI INCITS ISO IEC 9796-1991 Information Technology - Security Techniques - Digital Signature Scheme Giving Message Recovery (Adopted by INCITS).pdf ANSI INCITS ISO IEC 9796-1991 Information Technology - Security Techniques - Digital Signature Scheme Giving Message Recovery (Adopted by INCITS).pdf
  • ANSI INCITS ISO IEC 9796-2 AMD 1-2008 Information technology Security techniques Digital signature schemes giving message recovery Part 2 Mechanisms using a hash-function Amendment.pdf ANSI INCITS ISO IEC 9796-2 AMD 1-2008 Information technology Security techniques Digital signature schemes giving message recovery Part 2 Mechanisms using a hash-function Amendment.pdf
  • ANSI INCITS ISO IEC 9796-2-2002 Information technology Security techniques Digital signature schemes giving message recovery Part 2 Integer factorization based mechanisms (Adopted .pdf ANSI INCITS ISO IEC 9796-2-2002 Information technology Security techniques Digital signature schemes giving message recovery Part 2 Integer factorization based mechanisms (Adopted .pdf
  • ANSI INCITS ISO IEC 9796-3-2000 Information technology Security techniques Digital signature schemes giving message recovery Part 3 Discrete logarithm based mechanisms.pdf ANSI INCITS ISO IEC 9796-3-2000 Information technology Security techniques Digital signature schemes giving message recovery Part 3 Discrete logarithm based mechanisms.pdf
  • ANSI INCITS ISO IEC 9797-1-1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1 Mechanisms using a block cipher.pdf ANSI INCITS ISO IEC 9797-1-1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1 Mechanisms using a block cipher.pdf
  • ANSI INCITS ISO IEC 9797-2-2002 Information technology Security techniques Message Authentication Codes (MACs) Part 2 Mechanisms using a dedicated hash-function (Adopted by INCITS).pdf ANSI INCITS ISO IEC 9797-2-2002 Information technology Security techniques Message Authentication Codes (MACs) Part 2 Mechanisms using a dedicated hash-function (Adopted by INCITS).pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > ARMY

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1