|
381 |
Detection of Intrusions and Malware, and Vulnerability Assessment Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
382 |
Detection of Intrusions and Malware, and Vulnerability Assessment Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
383 |
Die Kunst der Täuschung Mitnick, Kevin D.. - Heidelberg : mitp/bhv, 2013, 2006
|
|
|
384 |
Economics of Information Security and Privacy III New York, NY : Springer New York, 2013
|
|
|
385 |
Engineering Secure Software and Systems Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
386 |
Enterprise Security Erlangen : PUBLICIS, 2013, 1., Auflage, neue Ausg.
|
|
|
387 |
Foundations and Practice of Security Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
388 |
Gehckt George, Michael. - Reinbek : Rowohlt E-Book, 2013, 1. Aufl.
|
|
|
389 |
Grid and Pervasive Computing Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
390 |
Information and Communication Technology Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|