This HTML5 document contains 11 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n6http://dbkwik.webdatacommons.org/resource/L5OUQCas3NG0Nvi_BWCthQ==
n10http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n14http://dbkwik.webdatacommons.org/resource/JRE6vGHxWf8UyJGuI9ywrQ==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n11http://dbkwik.webdatacommons.org/resource/sNtuKMvuNGaqGZFqB4HXag==
n9http://dbkwik.webdatacommons.org/resource/Ghm_oPHpiRVAWQKgHMglww==
n12http://dbkwik.webdatacommons.org/resource/S1lDzMeiu3No1tYsl7i9-Q==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://dbkwik.webdatacommons.org/resource/dSWvyOaMIwhIdBi4pF9KiA==
n5http://dbkwik.webdatacommons.org/starwars/property/
n4http://dbkwik.webdatacommons.org/resource/n1dshzWbEcgUMF4aWXL83w==
xsdhhttp://www.w3.org/2001/XMLSchema#
n13http://dbkwik.webdatacommons.org/resource/b_dpncPwOushPm1hbt5ysA==
n2http://dbkwik.webdatacommons.org/resource/doek1fKCkAIugzGeOi_bhQ==
Subject Item
n9:
n10:wikiPageDisambiguates
n2:
Subject Item
n2:
rdfs:label
Imperial Security Operations
rdfs:comment
The main building was a maximum security area with all posts alert at all times. It hosted a reader that could interpret Imperial secret codes that had been written to nava cards, among other types of memory circuits. The machine was fairly inaccessible; anyone wanting to access the terminal without authorization had to pass through a complex system of concentric circles, separated by gates that were controlled by switches on the outermost concentric corridor. Normally, Imperial Officers stationed around the perimeter would activate them remotely, providing fairly comprehensive security; one could not access the central core without first getting permission from the six security officers.
dcterms:subject
n8: n12: n13:
n5:wikiPageUsesTemplate
n6: n11:
n4:
Имперское оперативное управление контрразведки
n14:
Operaciones de Seguridad Imperial
n10:abstract
The main building was a maximum security area with all posts alert at all times. It hosted a reader that could interpret Imperial secret codes that had been written to nava cards, among other types of memory circuits. The machine was fairly inaccessible; anyone wanting to access the terminal without authorization had to pass through a complex system of concentric circles, separated by gates that were controlled by switches on the outermost concentric corridor. Normally, Imperial Officers stationed around the perimeter would activate them remotely, providing fairly comprehensive security; one could not access the central core without first getting permission from the six security officers. Kyle Katarn managed to break into the building in order to decode a nava card that he had obtained earlier from Nar Shaddaa and write the Executor's current star-route on to a set of data disks, in order to find the secret location of the Arc Hammer.