
Gebundenes Buch
Fundamentals, Technology and Society
3. März 2025
Kogan Page Ltd

Broschiertes Buch
Fundamentals, Technology and Society
25. März 2025
Kogan Page

Ähnliche Artikel


Broschiertes Buch
Advances, Challenges and Future Research Directions
1. September 2016
Syngress
C2015-0-00278-7

Broschiertes Buch
Reversing Modern Malware and Next Generation Threats
3. Mai 2019
No Starch Press

Broschiertes Buch
Solving Real-World Problems Using Quantum Computing and Algorithms
1st ed.
21. Dezember 2020
Apress / Springer, Berlin
978-1-4842-6515-4

Gebundenes Buch
A Case Study of the Russian Federation
7. Dezember 2018
Taylor & Francis Ltd (Sales)

Gebundenes Buch
17. August 2018
River Publishers


Broschiertes Buch
5. Juli 2024
tredition

Broschiertes Buch
Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
2011
18. November 2011
Springer / Springer Berlin Heidelberg / Springer, Berlin
80075365,978-3-642-25282-2

Broschiertes Buch
Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)
10. Dezember 2020
ITGP
Ähnlichkeitssuche: Fact®Finder von OMIKRON