Accessible Requires Authentication Published by De Gruyter Oldenbourg 2014

IT-Sicherheit

Konzepte - Verfahren - Protokolle

IT Security: Concepts, Procedures, and Protocols
Claudia Eckert