
Gebundenes Buch
22. Januar 2016
CRC Press

Broschiertes Buch
29. August 2022
CRC Press
Gebundenes Buch | 163,99 € | |
eBook, PDF | 45,95 € |

Ähnliche Artikel


Gebundenes Buch
Addressing the Conflicts Between It and Security Teams
5. Oktober 2022
CRC Press

Gebundenes Buch
Design, Implementation, Measurement, and Compliance
1. Juli 2006
CRC Press


Gebundenes Buch
Leading High-Performance Teams During a Crisis
4. Oktober 2021
CRC Press



Broschiertes Buch
Security Management Based on ISO 27001 Guidelines
First Edition
10. Dezember 2019
Apress / Springer, Berlin
978-1-4842-5412-7


Gebundenes Buch
A Comprehensive Guide to Securing Your Information in a Moving World
16. Juni 2010
CRC Press
Ähnlichkeitssuche: Fact®Finder von OMIKRON