![Biometric Presentation Attack Detection Biometric Presentation Attack Detection](https://bilder.buecher.de/produkte/64/64136/64136929m.jpg)
Gebundenes Buch
Towards securing biometric authentication systems
21. Dezember 2023
IOP Publishing Ltd
![Beyond the Blast Furnace Beyond the Blast Furnace](https://bilder.buecher.de/produkte/21/21255/21255207m.jpg)
![Satellite Towns in Neo-metropolitan Development in India (eBook, PDF) Satellite Towns in Neo-metropolitan Development in India (eBook, PDF)](https://bilder.buecher.de/produkte/58/58715/58715994m.jpg)
eBook, PDF
21. Februar 2020
Springer Singapore
Broschiertes Buch | 81,99 € | |
Gebundenes Buch | 110,99 € |
![Satellite Towns in Neo-metropolitan Development in India Satellite Towns in Neo-metropolitan Development in India](https://bilder.buecher.de/produkte/61/61090/61090711m.jpg)
Broschiertes Buch
Lessons from Selected Cities
1st ed. 2020
22. Februar 2021
Springer / Springer Nature Singapore / Springer, Berlin
978-981-15-1504-0
![Satellite Towns in Neo-metropolitan Development in India Satellite Towns in Neo-metropolitan Development in India](https://bilder.buecher.de/produkte/57/57924/57924665m.jpg)
Gebundenes Buch
Lessons from Selected Cities
1st ed. 2020
22. Februar 2020
Springer / Springer Nature Singapore / Springer, Berlin
978-981-15-1501-9
Ähnliche Artikel
![Security and Privacy in Internet of Things (Iots) Security and Privacy in Internet of Things (Iots)](https://bilder.buecher.de/produkte/43/43774/43774545m.jpg)
Gebundenes Buch
Models, Algorithms, and Implementations
1. April 2016
Taylor & Francis Ltd (Sales)
![Managing Internet of Things Applications Across Edge and Cloud Data Centres Managing Internet of Things Applications Across Edge and Cloud Data Centres](https://bilder.buecher.de/produkte/57/57703/57703781m.jpg)
Gebundenes Buch
11. Juni 2024
Institution of Engineering & Technology
![Surveillance or Security?: The Risks Posed by New Wiretapping Technologies Surveillance or Security?: The Risks Posed by New Wiretapping Technologies](https://bilder.buecher.de/produkte/32/32462/32462257m.jpg)
12,99 €
Versandfertig in über 4 Wochen
Gebundenes Buch
Januar 2011
MIT Press
![A History of Cyber Security Attacks A History of Cyber Security Attacks](https://bilder.buecher.de/produkte/48/48746/48746371m.jpg)
![Hands-On Ethical Hacking and Network Defense, Loose-Leaf Version Hands-On Ethical Hacking and Network Defense, Loose-Leaf Version](https://bilder.buecher.de/produkte/63/63984/63984090m.jpg)
Loseblattsammlung
18. Mai 2022
Cengage Learning
![Trusted Platform Modules: Why, When and How to Use Them Trusted Platform Modules: Why, When and How to Use Them](https://bilder.buecher.de/produkte/42/42561/42561952m.jpg)
Gebundenes Buch
23. November 2016
Institution of Engineering & Technology
![Honeypots and Routers Honeypots and Routers](https://bilder.buecher.de/produkte/43/43022/43022283m.jpg)
![Security in Distributed, Grid, Mobile, and Pervasive Computing Security in Distributed, Grid, Mobile, and Pervasive Computing](https://bilder.buecher.de/produkte/22/22074/22074611m.jpg)
![Implementing the ISO/IEC 27001 Information Security Management System Standard Implementing the ISO/IEC 27001 Information Security Management System Standard](https://bilder.buecher.de/produkte/22/22721/22721162m.jpg)
Gebundenes Buch
September 2007
Artech House Publishers
![Information Security: Theory and Practice Information Security: Theory and Practice](https://bilder.buecher.de/produkte/56/56734/56734585m.jpg)
Ähnlichkeitssuche: Fact®Finder von OMIKRON