![Host Identity Protocol (Hip) Host Identity Protocol (Hip)](https://bilder.buecher.de/produkte/24/24623/24623317m.jpg)
Gebundenes Buch
Towards the Secure Mobile Internet
1. Auflage
1. August 2008
Wiley & Sons
![Structured Peer-to-Peer Systems (eBook, PDF) Structured Peer-to-Peer Systems (eBook, PDF)](https://bilder.buecher.de/produkte/37/37675/37675612m.jpg)
eBook, PDF
12. November 2012
Springer New York
Broschiertes Buch | 97,99 € | |
Gebundenes Buch | 74,99 € |
![Structured Peer-to-Peer Systems Structured Peer-to-Peer Systems](https://bilder.buecher.de/produkte/41/41907/41907095m.jpg)
Broschiertes Buch
Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
2013
13. Dezember 2014
Springer / Springer New York / Springer, Berlin
978-1-4899-8694-8
![Structured Peer-to-Peer Systems Structured Peer-to-Peer Systems](https://bilder.buecher.de/produkte/36/36155/36155632m.jpg)
Gebundenes Buch
Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
2013
12. November 2012
Springer / Springer New York / Springer, Berlin
978-1-4614-5482-3
Ähnliche Artikel
![Distributed Systems Security Distributed Systems Security](https://bilder.buecher.de/produkte/23/23524/23524888m.jpg)
Gebundenes Buch
Issues, Processes and Solutions
1. Auflage
1. April 2009
Wiley & Sons
![Sip Security Sip Security](https://bilder.buecher.de/produkte/23/23421/23421098m.jpg)
![Wireless Mobile Internet Security Wireless Mobile Internet Security](https://bilder.buecher.de/produkte/38/38605/38605111m.jpg)
![Security of Block Ciphers Security of Block Ciphers](https://bilder.buecher.de/produkte/42/42766/42766484m.jpg)
Gebundenes Buch
From Algorithm Design to Hardware Implementation
1. Auflage
28. Februar 2016
Wiley & Sons
![Vehicular AD Hoc Network Security and Privacy Vehicular AD Hoc Network Security and Privacy](https://bilder.buecher.de/produkte/42/42069/42069911m.jpg)
![Engineering Information Security Engineering Information Security](https://bilder.buecher.de/produkte/31/31187/31187317m.jpg)
![Security for Ubiquitous Computing Security for Ubiquitous Computing](https://bilder.buecher.de/produkte/10/10526/10526621m.jpg)
![Information Security Information Security](https://bilder.buecher.de/produkte/25/25050/25050544m.jpg)
![Security Management of Next Generation Telecommunications Networks and Services Security Management of Next Generation Telecommunications Networks and Services](https://bilder.buecher.de/produkte/30/30206/30206096m.jpg)
Gebundenes Buch
1. Auflage
Januar 2014
Wiley & Sons
![Chinese Cybersecurity and Defense Chinese Cybersecurity and Defense](https://bilder.buecher.de/produkte/40/40201/40201835m.jpg)
Ähnlichkeitssuche: Fact®Finder von OMIKRON