|
381 |
Bluetooth Security Attacks Cham : Springer International Publishing, 2013
|
|
|
382 |
Computer Information Systems and Industrial Management Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
383 |
Critical Information Infrastructure Security Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
384 |
Critical Information Infrastructures Security Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
385 |
Data Privacy Management and Autonomous Spontaneous Security Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
386 |
Dependable Computing Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
387 |
Detection of Intrusions and Malware, and Vulnerability Assessment Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
388 |
Detection of Intrusions and Malware, and Vulnerability Assessment Berlin, Heidelberg : Springer Berlin Heidelberg, 2013
|
|
|
389 |
Die Kunst der Täuschung Mitnick, Kevin D.. - Heidelberg : mitp/bhv, 2013, 2006
|
|
|
390 |
Economics of Information Security and Privacy III New York, NY : Springer New York, 2013
|
|