Informationssicherheit - Steganographie, Kryptologie, Organisation und Recht

Nonfiction, Computers, Advanced Computing, Computer Science, Information Technology
Cover of the book Informationssicherheit - Steganographie, Kryptologie, Organisation und Recht by , Wildau Verlag
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783945560518
Publisher: Wildau Verlag Publication: April 15, 2016
Imprint: Wildau Verlag Language: German
Author:
ISBN: 9783945560518
Publisher: Wildau Verlag
Publication: April 15, 2016
Imprint: Wildau Verlag
Language: German

Das Buch zeigt in kompakter Form, wie man als Wirtschaftsunternehmen, Institution, Privatperson seine vertraulichen Daten schützen kann - vor Online-Kriminalität, Hacker-Angriffen oder Geheimdienstaktivitäten

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Das Buch zeigt in kompakter Form, wie man als Wirtschaftsunternehmen, Institution, Privatperson seine vertraulichen Daten schützen kann - vor Online-Kriminalität, Hacker-Angriffen oder Geheimdienstaktivitäten

More books from Information Technology

Cover of the book Distributed Applications and Interoperable Systems by
Cover of the book Geographical Information Systems Theory, Applications and Management by
Cover of the book High Performance Computing by
Cover of the book Advances in Intelligent Data Analysis XV by
Cover of the book Ethereum Studio IDE Manual by
Cover of the book Scala Machine Learning Projects by
Cover of the book IT Virtualization Best Practices by
Cover of the book Introduction to Data Compression by
Cover of the book Microsoft Dynamics NAV 2009 Programming Cookbook by
Cover of the book Social Knowledge: Organizational Currencies in the New Knowledge Economy by
Cover of the book IT Security Concepts by
Cover of the book Implementing Digital Forensic Readiness by
Cover of the book Valuing Data by
Cover of the book Matplotlib for Python Developers by
Cover of the book Quantum Dots for Quantum Information Processing: Controlling and Exploiting the Quantum Dot Environment by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy