
22,95 €
Sofort per Download lieferbar

Broschiertes Buch
Building Effective Vulnerability Management Strategies to Protect Organizations
First Edition
16. Juni 2018
Apress / Springer, Berlin
978-1-4842-3626-0
eBook, PDF | 35,95 € |

Ähnliche Artikel





eBook, PDF
2. Mai 2024
Taylor & Francis eBooks




Ähnlichkeitssuche: Fact®Finder von OMIKRON