
Broschiertes Buch
Softcover reprint of hardcover 1st edition 2009
8. Dezember 2010
Springer / Springer US / Springer, Berlin
978-1-4419-4539-6
Gebundenes Buch | 77,99 € | |
eBook, PDF | 73,95 € |

Broschiertes Buch
Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008
2008
29. April 2008
Springer / Springer Berlin Heidelberg / Springer, Berlin
12269297,978-3-540-79965-8
eBook, PDF | 40,95 € |

Gebundenes Buch
1st Edition.2nd Printing. 2008
2. Dezember 2008
Springer / Springer US / Springer, Berlin
12116799,978-0-387-75629-5

eBook, PDF
31. Oktober 2008
Springer New York
Ähnliche Artikel

Gebundenes Buch
An Emerging Landscape
1st Edition. 2nd Printing. 2008
4. Dezember 2008
Springer / Springer US / Springer, Berlin
12269761,978-0-387-09763-3

Broschiertes Buch
An Emerging Landscape
Softcover reprint of hardcover 1st ed. 2009
6. Dezember 2010
Springer / Springer US / Springer, Berlin
978-1-4419-3530-4

Broschiertes Buch
2. Aufl.
29. November 2010
Springer / Springer US / Springer, Berlin
978-1-4419-4586-0

Broschiertes Buch
Softcover reprint of hardcover 1st ed. 2009
25. November 2010
Springer / Springer US / Springer, Berlin
978-1-4419-4689-8

Broschiertes Buch
Beyond the Hacker
Softcover reprint of hardcover 1st ed. 2008
19. November 2010
Springer / Springer US / Springer, Berlin
978-1-4419-4589-1

Gebundenes Buch
2nd ed.
2. Dezember 2008
Springer / Springer US / Springer, Berlin
12119073,978-0-387-77267-7

Gebundenes Buch
1st Edition. 2nd Printing. 2008
4. Dezember 2008
Springer / Springer US / Springer, Berlin
12451463,978-0-387-87968-0

Gebundenes Buch
Beyond the Hacker
2008
7. April 2008
Springer / Springer US / Springer, Berlin
12200689,978-0-387-77321-6

Gebundenes Buch
1st Edition. 2nd Printing. 2008
21. November 2008
Springer / Springer US / Springer, Berlin
12196401,978-0-387-77323-0
Ähnlichkeitssuche: Fact®Finder von OMIKRON