1
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

2
by Kebschull, Udo
Published 2023
Springer Berlin Heidelberg
Table of Contents: ... -- 6 Mobile Hacking -- 7 Internet of Things -- Teil III Abwehr von Cyberattacken -- 8 Allgemeine...

3
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

4
Published 2022
Springer Fachmedien Wiesbaden
Subjects: ...Computer networks / Security measures...

5
Published 2021
Springer Fachmedien Wiesbaden
Subjects: ...Computer networks / Security measures...

6
by Herfurth, Constantin
Published 2022
Springer Fachmedien Wiesbaden
Subjects: ...Computer networks—Security measures...

7
by Ballmann, Bastian
Published 2020
Springer Berlin Heidelberg
Subjects: ...Computer networks—Security measures...

8
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... -- Session Mobile Computing -- Interaktionsmuster zur dynamischen Personalisierung von Dienstendpunkten...

9
Published 2009
Physica
Table of Contents: ...Der Erfolg interdisziplinärer Gründungslehre am Beispiel der FH Bonn-Rhein-Sieg -- Mobile Business...