{"leader":"00604naa#a2200157#i#450#","fields":[{"001":"EN\\\\bibl\\63932"},{"005":"20250412105424.6"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"2078-5356"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20230331b2023####ek#y0engy0150####ca"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"The concept and types of social engineering methods used in the commission of crimes in the field of information and telecommunication technologies"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Nizhny Novgorod"},{"c":"Nizhny Novgorod Academy of the Ministry of the Interior of Russia"},{"d":"2023"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"7 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Starostenko"},{"g":"Nina Igorevna"}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"namvd.editorum.ru"},{"u":""}]}}]}