



Ähnliche Artikel

Broschiertes Buch
12. Juli 2012
Morgan & Claypool / Springer / Springer International Publishing / Springer, Berlin
978-3-031-00762-0

Gebundenes Buch
How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
24. Januar 2012
Addison-Wesley Longman, Amsterdam

Broschiertes Buch
2010
13. Oktober 2012
Springer / Springer US / Springer, Berlin
978-1-4614-2638-7

Broschiertes Buch
Issues, Approaches, and Challenges
Softcover reprint of hardcover 1st ed. 2005
6. Dezember 2010
Springer / Springer US / Springer, Berlin
978-1-4419-3705-6

Gebundenes Buch
1. Auflage
8. Dezember 2022
Wiley & Sons / Wiley-IEEE Press
1W119884140

Gebundenes Buch
How to Identify the Actors Behind Cyber-Espionage
1st edition 2020
21. Juli 2020
Springer Berlin Heidelberg / Springer Vieweg / Springer, Berlin / Springer-Verlag GmbH
978-3-662-61312-2

29,99 €
Versandfertig in 6-10 Tagen
Broschiertes Buch
28. Juli 2015
LAP Lambert Academic Publishing


Broschiertes Buch
A Guide to Foundations and Challenges
2. Aufl.
17. Juli 2024
Apress / Springer, Berlin
979-8-8688-0338-3
Ähnlichkeitssuche: Fact®Finder von OMIKRON