Falls Sie nur an einem bestimmten Exempar interessiert sind, können Sie aus der folgenden Liste jenes wählen, an dem Sie interessiert sind:
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Ten Laws for Security - 16 Angebote vergleichen
Preise | Dez. 16 | März 19 | Sep. 19 |
---|---|---|---|
Schnitt | € 44,62 | € 47,16 | € 47,96 |
Nachfrage |
Ten Laws for Security (2016)
ISBN: 9783319426396 bzw. 3319426397, vermutlich in Englisch, Springer, gebundenes Buch, neu.
Ten Laws for Security In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security. 22.11.2016, gebundene Ausgabe.
Ten Laws for Security
ISBN: 9783319426396 bzw. 3319426397, vermutlich in Englisch, Springer Shop, gebundenes Buch, neu.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security. Hard cover.
Ten Laws for Security
ISBN: 9783319426419 bzw. 3319426419, in Deutsch, Springer International Publishing, neu, E-Book, elektronischer Download.
Ten Laws for Security: In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security. Englisch, Ebook.
Ten Laws for Security
ISBN: 9783319426419 bzw. 3319426419, in Deutsch, Springer Shop, neu, E-Book, elektronischer Download.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security. eBook.
| Ten Laws for Security | Springer | 1st ed. 2016 | 2016
ISBN: 9783319426396 bzw. 3319426397, vermutlich in Englisch, Springer, neu.
Ten Laws for Security (2016)
ISBN: 9783319426419 bzw. 3319426419, in Englisch, Springer, Springer, Springer, neu, E-Book, elektronischer Download.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
Ten Laws for Security
ISBN: 9783319426396 bzw. 3319426397, vermutlich in Englisch, neu.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.