
Gebundenes Buch
Status and Prospects
1999.
30. April 1999
Springer / Springer US / Springer, Berlin
978-0-7923-8488-5

Broschiertes Buch
Softcover reprint of the original 1st ed. 2000
1. Dezember 2010
Springer / Springer Berlin Heidelberg / Springer, Berlin
978-3-642-08634-2
eBook, PDF | 40,95 € |

Broschiertes Buch
Softcover reprint of hardcover 1st ed. 2002
8. Dezember 2010
Springer, Berlin
Gebundenes Buch | 81,99 € | |
eBook, PDF | 73,95 € |

Gebundenes Buch
IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22-27 August 2004 Toulouse, France
2004
27. Juli 2004
Springer Netherlands

Gebundenes Buch
2002
30. November 2001
Springer / Springer US / Springer, Berlin
978-0-7923-7572-2

Broschiertes Buch
Steganography and Watermarking - Attacks and Countermeasures
2001
5. Oktober 2012
Springer, Berlin
Gebundenes Buch | 81,99 € | |
eBook, PDF | 73,95 € |

Gebundenes Buch
Applications and Trends
2008
30. November 2007
Springer / Springer US / Springer, Berlin
11886082,978-0-387-48532-4
eBook, PDF | 81,95 € |

Broschiertes Buch
An Automated Approach to Improving Network Security
2014
18. März 2014
Springer / Springer International Publishing / Springer, Berlin
978-3-319-04611-2
eBook, PDF | 40,95 € |



eBook, PDF
6. April 2007
Springer New York

Gebundenes Buch
Steganography and Watermarking - Attacks and Countermeasures
2000.
31. Dezember 2000
Springer / Springer US / Springer, Berlin
978-0-7923-7204-2


eBook, PDF
29. Juni 2013
Springer Berlin Heidelberg

eBook, PDF
14. März 2013
Springer New York
Ähnlichkeitssuche: Fact®Finder von OMIKRON