![Trustworthy Execution on Mobile Devices Trustworthy Execution on Mobile Devices](https://bilder.buecher.de/produkte/38/38464/38464406m.jpg)
Broschiertes Buch
2014
11. August 2013
Springer / Springer New York / Springer, Berlin
978-1-4614-8189-8
![Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers](https://bilder.buecher.de/produkte/33/33749/33749471m.jpg)
Broschiertes Buch
2011
30. August 2011
Springer / Springer New York / Springer, Berlin
978-1-4614-1459-9
Ähnliche Artikel
![Location Privacy Protection in Mobile Networks (eBook, PDF) Location Privacy Protection in Mobile Networks (eBook, PDF)](https://bilder.buecher.de/produkte/43/43798/43798913m.jpg)
eBook, PDF
17. Oktober 2013
Springer New York
![Secure and Trustworthy Transportation Cyber-Physical Systems (eBook, PDF) Secure and Trustworthy Transportation Cyber-Physical Systems (eBook, PDF)](https://bilder.buecher.de/produkte/53/53060/53060773m.jpg)
eBook, PDF
16. Oktober 2017
Springer Singapore
![Querying over Encrypted Data in Smart Grids (eBook, PDF) Querying over Encrypted Data in Smart Grids (eBook, PDF)](https://bilder.buecher.de/produkte/43/43793/43793656m.jpg)
eBook, PDF
9. Mai 2014
Springer International Publishing
![Android Malware (eBook, PDF) Android Malware (eBook, PDF)](https://bilder.buecher.de/produkte/43/43786/43786717m.jpg)
![Moving Target Defense II (eBook, PDF) Moving Target Defense II (eBook, PDF)](https://bilder.buecher.de/produkte/37/37794/37794569m.jpg)
![Voice over IP Security (eBook, PDF) Voice over IP Security (eBook, PDF)](https://bilder.buecher.de/produkte/37/37346/37346795m.jpg)
![Leakage Resilient Password Systems (eBook, PDF) Leakage Resilient Password Systems (eBook, PDF)](https://bilder.buecher.de/produkte/43/43799/43799918m.jpg)
eBook, PDF
23. April 2015
Springer International Publishing
![Mobile Authentication (eBook, PDF) Mobile Authentication (eBook, PDF)](https://bilder.buecher.de/produkte/43/43987/43987632m.jpg)
![Identifying Malicious Code Through Reverse Engineering (eBook, PDF) Identifying Malicious Code Through Reverse Engineering (eBook, PDF)](https://bilder.buecher.de/produkte/43/43729/43729161m.jpg)
eBook, PDF
27. Februar 2009
Springer US
![Moving Target Defense (eBook, PDF) Moving Target Defense (eBook, PDF)](https://bilder.buecher.de/produkte/43/43992/43992347m.jpg)
Ähnlichkeitssuche: Fact®Finder von OMIKRON