
22,95 €
Sofort per Download lieferbar

Broschiertes Buch
Strategically Designing and Implementing Identity Security, Second Edition
2. Aufl.
31. März 2024
Apress / Springer, Berlin
979-8-8688-0232-4
eBook, PDF | 48,95 € |

Broschiertes Buch
Building Effective Cyber-Defense Strategies to Protect Organizations
2. Aufl.
14. Juni 2020
Apress / Springer, Berlin
978-1-4842-5913-9
eBook, PDF | 60,95 € |

Broschiertes Buch
Building Effective Cyber-Defense Strategies to Protect Cloud Resources
1st ed.
22. Juli 2022
Apress / Springer, Berlin
978-1-4842-8235-9
eBook, PDF | 48,95 € |

Broschiertes Buch
Building Effective Vulnerability Management Strategies to Protect Organizations
First Edition
16. Juni 2018
Apress / Springer, Berlin
978-1-4842-3626-0
eBook, PDF | 35,95 € |






Broschiertes Buch
Building Effective Cyber-Defense Strategies to Protect Organizations
1st ed.
2017
Apress / Springer, Berlin
978-1-4842-3047-3
Ähnlichkeitssuche: Fact®Finder von OMIKRON