
Broschiertes Buch
1. Auflage
17. Juli 2012
IEEE Press / Wiley & Sons
1W118062410
eBook, ePUB | 69,99 € | |
eBook, PDF | 69,99 € |

Gebundenes Buch
Understanding the Increasing Problem of Electronic Identity Theft
1. Auflage
1. November 2006
Wiley & Sons
eBook, PDF | 107,99 € |

Broschiertes Buch
Problems and Solutions
2013
21. August 2012
Springer / Springer New York / Springer, Berlin
86130919,978-1-4614-4877-8
eBook, PDF | 40,95 € |

Broschiertes Buch
Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
2004
1. Juni 2004
Springer / Springer Berlin Heidelberg / Springer, Berlin
11014096,978-3-540-22217-0
eBook, PDF | 73,95 € |

Ähnliche Artikel

Gebundenes Buch
Protocol, Policy, and Privacy
1. Auflage
2. November 2015
Wiley & Sons



Gebundenes Buch
Machine Learning and Memory-Based Data Security
1. Auflage
7. Juni 2023
Wiley & Sons / Wiley-IEEE Press
1W119898870

Gebundenes Buch
1. Auflage
4. April 2022
Wiley / Wiley & Sons
1W119788280


Gebundenes Buch
1. Auflage
2. Oktober 2018
Wiley & Sons / Wiley-IEEE Computer Society Press
1W119428630

Gebundenes Buch
1. Auflage
19. April 2022
Wiley & Sons / Wiley-Scrivener
1W119812490

Gebundenes Buch
1. Auflage
7. Februar 2024
Wiley / Wiley & Sons
1W394176780
Ähnlichkeitssuche: Fact®Finder von OMIKRON