This HTML5 document contains 93 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n52http://dbkwik.webdatacommons.org/resource/yc-PjmDu5OqD_lXLV-WAEQ==
n56http://dbkwik.webdatacommons.org/resource/-HXFfhrd8aIqjUWlXkV_RA==
n38http://dbkwik.webdatacommons.org/resource/5cmbwxi91uvhF_F9iIqlEg==
n7http://dbkwik.webdatacommons.org/memory-beta/property/
n41http://dbkwik.webdatacommons.org/resource/NzY2g_mA_9ID1tB9Nqb1uw==
n57http://dbkwik.webdatacommons.org/resource/h_FljxpWDAl0VaM85-6mOA==
n68http://dbkwik.webdatacommons.org/resource/WPBMTwIqN4GIfFft48hKAA==
n2http://dbkwik.webdatacommons.org/resource/CkCKClcs1mVied5CZAXc0w==
n40http://dbkwik.webdatacommons.org/resource/-X7Xdl4I9s3LBq_skSXLgw==
n26http://dbkwik.webdatacommons.org/resource/QyClrJThCZDZjojjovF3LQ==
n36http://dbkwik.webdatacommons.org/resource/mj0hJgalWk2xyb-mvmdHEA==
n75http://dbkwik.webdatacommons.org/resource/QWld5w9Ns5YhKTJKS3Xksg==
n32http://dbkwik.webdatacommons.org/resource/fCr4OVRONBC9xrU3dUupjA==
n51http://dbkwik.webdatacommons.org/resource/ET5bAQzBxKKt-crQ8UWh8w==
n16http://dbkwik.webdatacommons.org/resource/4Y1rCl_n_apwwCHhNTE1NA==
n11http://dbkwik.webdatacommons.org/resource/xXLsM3cPo0IV0UgvDLzK4w==
n8http://dbkwik.webdatacommons.org/resource/iBOSWgYemLnYKnGmxSoqGw==
n76http://dbkwik.webdatacommons.org/resource/57Jhhm4KOlL5ozY-j7FChQ==
n77http://dbkwik.webdatacommons.org/resource/vZ1MgX1Nri8gwb0toCHyCw==
n9http://dbkwik.webdatacommons.org/resource/B9KYr7A3c2qBht9XYsimFQ==
n39http://dbkwik.webdatacommons.org/resource/ZzVsBQddvtV_Y8JhKaUa0A==
n45http://dbkwik.webdatacommons.org/resource/fMEj2LYqIkXEAZJXrtfWgg==
n12http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n63http://dbkwik.webdatacommons.org/resource/Xos3lSj8afC4TBo57ZxLDg==
n43http://dbkwik.webdatacommons.org/resource/_hJ_f6nnC8NO6PsxIfoF3Q==
n72http://dbkwik.webdatacommons.org/resource/_Lmewh-CR59Vc8rDF3oEWA==
dctermshttp://purl.org/dc/terms/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n73http://dbkwik.webdatacommons.org/resource/q2ZFYimTN0YfZQy7X8x0Mw==
n5http://dbkwik.webdatacommons.org/memory-alpha/property/
n33http://dbkwik.webdatacommons.org/resource/BuqnFF0c4YaSY84UD_j3cg==
n55http://dbkwik.webdatacommons.org/resource/UcfrMW9IzUhSjhvx92Pryg==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n21http://dbkwik.webdatacommons.org/resource/_V20sy86s8qHh6VGlBOzcg==
n79http://dbkwik.webdatacommons.org/resource/xQnLaBO-49mlOTNibhbBew==
n48http://dbkwik.webdatacommons.org/resource/gii9I5lXpLYL1u8A5Jr-Qg==
n6http://dbkwik.webdatacommons.org/resource/Asx2ADlpwvHCv50tZDu3BA==
n69http://dbkwik.webdatacommons.org/resource/lHxhwVWvObnLxM82xOHDng==
n13http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n61http://dbkwik.webdatacommons.org/resource/KJhL3iHGwqTrWkk2GfcgMw==
n46http://dbkwik.webdatacommons.org/resource/_YPSY5sFJEgwKHAXsUuQnw==
n10http://dbkwik.webdatacommons.org/resource/RfRC31tJvluaBtSdBFSUhg==
n60http://dbkwik.webdatacommons.org/resource/t7mNQGwPbbL0jyHITqwYlA==
n70http://dbkwik.webdatacommons.org/resource/3dSs8qRb3pJSbT-MafMdUA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n50http://dbkwik.webdatacommons.org/resource/rDc8wIIhfBFYo-6oy4XmpA==
n14http://dbkwik.webdatacommons.org/resource/8ZQxOvxbt118NM5lolz2ww==
n65http://dbkwik.webdatacommons.org/resource/-NGqATj1vc25OeZBt-30eg==
n42http://dbkwik.webdatacommons.org/resource/HIBOF1ZW6AeDFh-BUci-MA==
n54http://dbkwik.webdatacommons.org/resource/3eRScQ-CTjvo7AHWH9u3Tw==
n35http://dbkwik.webdatacommons.org/resource/6FBdTsjGaw5mXnhgTaUp4w==
n22http://dbkwik.webdatacommons.org/resource/0WOGw54fpcHMGfT4FsgDvw==
n25http://dbkwik.webdatacommons.org/resource/qhsIPYzO1HsVZHD5tfwirg==
n49http://dbkwik.webdatacommons.org/resource/piblc0-GaZvDsAqMytOCZQ==
n66http://dbkwik.webdatacommons.org/resource/bbCzcmVyhmR_PZkwxiSVgA==
n80http://dbkwik.webdatacommons.org/resource/p__HWX-sGQtjfdCA3TrojQ==
n29http://dbkwik.webdatacommons.org/resource/8C6pUobppLH4g06BSIA17w==
n62http://dbkwik.webdatacommons.org/resource/SaXgwzY8EdVtPWW-hEm3sg==
n47http://dbkwik.webdatacommons.org/resource/mnCiMqfpwLUe26zrLTNcIg==
n18http://dbkwik.webdatacommons.org/resource/_wx1n8hPh7jv-T8X2T1CAw==
n20http://dbkwik.webdatacommons.org/resource/dtIA-E6aGATymw8ng5TsqA==
n78http://dbkwik.webdatacommons.org/resource/Kjt8JAEyK0fFpjiZ166QMg==
n4http://dbkwik.webdatacommons.org/resource/Y5VKbUuETxavYWrCPkr4Bg==
n71http://dbkwik.webdatacommons.org/ontology/
n74http://dbkwik.webdatacommons.org/resource/IcJfte6Tt1N5voPAR_vBwQ==
n67http://dbkwik.webdatacommons.org/resource/2ihtYd-z2Zd4pxfxGPKlFA==
n37http://dbkwik.webdatacommons.org/resource/KPuksvL_VgMHFL1Xv8RtHg==
n28http://dbkwik.webdatacommons.org/resource/twz5tfX3sxGrdWOzeNmiwQ==
n59http://dbkwik.webdatacommons.org/resource/nrpoxKDPPsOEeT0iK--uUg==
n23http://dbkwik.webdatacommons.org/resource/q5jHY3Qk1gG_mBN7RUVvZw==
n58http://dbkwik.webdatacommons.org/resource/AVIME1fqHE2tnILk5Sr3Rw==
n24http://dbkwik.webdatacommons.org/resource/fwG70RoJoigyRrgMSz_Olw==
n27http://dbkwik.webdatacommons.org/resource/0coLEUTTEzh-_oSemjKjBQ==
n19http://dbkwik.webdatacommons.org/resource/6-cjk5__DeSAvRWeT6sf6w==
n15http://dbkwik.webdatacommons.org/resource/-pDTH2DXlkM_o29en-6Cfg==
n34http://dbkwik.webdatacommons.org/resource/XJYDYtslUMyTMwM88Zn6nQ==
n30http://dbkwik.webdatacommons.org/resource/IM2vchgS5k5-HuF83XEmew==
n44http://dbkwik.webdatacommons.org/resource/NolrXYdFs03L6IP_t1UE0w==
n53http://dbkwik.webdatacommons.org/resource/uuyVSANfQxRgd19UEbsUJg==
n64http://dbkwik.webdatacommons.org/resource/SSYlAsJfaqKITeqE0tgQ6w==
n17http://dbkwik.webdatacommons.org/resource/6hXHqY2N_Hlkujht9z-Z9w==
Subject Item
n33:
n34:
n2:
Subject Item
n60:
n57:
n2:
Subject Item
n54:
n58:
n2:
Subject Item
n2:
rdfs:label
Night of the Wolves
rdfs:comment
Objectives: -Contact the wounded Ally. -Steal the office key from the General's assistant. -Steal the Enigma's machine from the General's safe. -Decipher the message using the Enigma machine. -Use the radio. -The thief must hide under a bed. Secondary objectives: -Steal the security papers. Clues: -Contact Natasha. -Disconnect the power to the electric fence. -Use the sleeping pills to knock out the assistant. -Natasha can call the General on the phone. Night of the Wolves is the second book in the Star Trek: Terok Nor trilogy of novels that follows the Occupation of Bajor, this novel covers the period 2345 to 2357.
dcterms:subject
n4: n25: n35: n73:
n41:
First Star Trek story
n34:
n40:
n46:
Pathways
n49:
n50:
n5:wikiPageUsesTemplate
n6: n10: n29: n32: n36: n37: n47: n51: n75: n76: n77: n80:
n7:wikiPageUsesTemplate
n8: n9: n14: n24: n28: n38: n43: n44: n48: n52: n55: n56: n59: n63: n72: n74: n78:
n70:
n62:
n13:
2357 2353 2348 2347 2345
n61:
n62: n64: n67: Terok Nor #2 DS9
n12:
MB novel
n16:
Death in Winter Mosaic n39: The Art of the Impossible Stone and Anvil
n17:
n18: Red Sector Mosaic Once Burned Alice, on the Edge of Night
n19:
n20: n60:
n45:
384 464
n57:
Night of the Wolves
n65:
200
n21:
n22: novel
n53:
n54:
n58:
n40:
n66:
2346
n42:
Day of the Vipers
n15:
--04-29 May 2008
n26:
n27:
n23:
Dawn of the Eagles
n68:
n69:
n79:
2345
n11:
ISBN 0-7434-8251-4 743482514 ISBN 141659177X
n30:
Timeframe5
n71:abstract
Night of the Wolves is the second book in the Star Trek: Terok Nor trilogy of novels that follows the Occupation of Bajor, this novel covers the period 2345 to 2357. Objectives: -Contact the wounded Ally. -Steal the office key from the General's assistant. -Steal the Enigma's machine from the General's safe. -Decipher the message using the Enigma machine. -Use the radio. -The thief must hide under a bed. Secondary objectives: -Steal the security papers. Clues: -Contact Natasha. -Disconnect the power to the electric fence. -Use the sleeping pills to knock out the assistant. -Natasha can call the General on the phone.
Subject Item
n20:
n57:
n2:
Subject Item
n40:
n41:
n2:
n53:
n2: