![Dynamic Secrets in Communication Security (eBook, PDF) Dynamic Secrets in Communication Security (eBook, PDF)](https://bilder.buecher.de/produkte/44/44597/44597317m.jpg)
eBook, PDF
13. August 2013
Springer New York
Broschiertes Buch | 37,99 € | |
Gebundenes Buch | 37,99 € |
![Modeling, Control and Optimization of Complex Systems Modeling, Control and Optimization of Complex Systems](https://bilder.buecher.de/produkte/22/22425/22425261m.jpg)
Gebundenes Buch
In Honor of Professor Yu-Chi Ho
2003
31. Oktober 2002
Springer / Springer Netherlands / Springer US
978-1-4020-7208-6
![Dynamic Secrets in Communication Security Dynamic Secrets in Communication Security](https://bilder.buecher.de/produkte/43/43935/43935996m.jpg)
Broschiertes Buch
Softcover reprint of the original 1st ed. 2014
16. Oktober 2015
Springer / Springer New York / Springer, Berlin
978-1-4939-0229-3
![Dynamic Secrets in Communication Security Dynamic Secrets in Communication Security](https://bilder.buecher.de/produkte/37/37790/37790654m.jpg)
Gebundenes Buch
2014
7. August 2013
Springer / Springer New York / Springer, Berlin
978-1-4614-7830-0
Ähnliche Artikel
![Secure Group Communications Over Data Networks (eBook, PDF) Secure Group Communications Over Data Networks (eBook, PDF)](https://bilder.buecher.de/produkte/37/37286/37286229m.jpg)
![Encryption for Digital Content (eBook, PDF) Encryption for Digital Content (eBook, PDF)](https://bilder.buecher.de/produkte/37/37345/37345682m.jpg)
![Online Business Security Systems (eBook, PDF) Online Business Security Systems (eBook, PDF)](https://bilder.buecher.de/produkte/37/37287/37287895m.jpg)
![Secure Multi-Party Non-Repudiation Protocols and Applications (eBook, PDF) Secure Multi-Party Non-Repudiation Protocols and Applications (eBook, PDF)](https://bilder.buecher.de/produkte/37/37288/37288421m.jpg)
eBook, PDF
31. Oktober 2008
Springer US
![Digital Signatures (eBook, PDF) Digital Signatures (eBook, PDF)](https://bilder.buecher.de/produkte/37/37288/37288167m.jpg)
![Insider Threats in Cyber Security (eBook, PDF) Insider Threats in Cyber Security (eBook, PDF)](https://bilder.buecher.de/produkte/37/37354/37354964m.jpg)
![Network Science and Cybersecurity (eBook, PDF) Network Science and Cybersecurity (eBook, PDF)](https://bilder.buecher.de/produkte/43/43794/43794784m.jpg)
![Moving Target Defense II (eBook, PDF) Moving Target Defense II (eBook, PDF)](https://bilder.buecher.de/produkte/37/37794/37794569m.jpg)
![Location Privacy Protection in Mobile Networks (eBook, PDF) Location Privacy Protection in Mobile Networks (eBook, PDF)](https://bilder.buecher.de/produkte/43/43798/43798913m.jpg)
eBook, PDF
17. Oktober 2013
Springer New York
![Spyware and Adware (eBook, PDF) Spyware and Adware (eBook, PDF)](https://bilder.buecher.de/produkte/37/37288/37288510m.jpg)
Ähnlichkeitssuche: Fact®Finder von OMIKRON