Search and Find
Service
Identifying Malicious Code Through Reverse Engineering
Springer-Verlag, 2009
Format: PDF, Read online
Embedded Security in Cars - Securing Current and Future Automotive IT Applications
Springer-Verlag, 2006
Format: PDF
Springer-Verlag, 2020
Format: PDF, Read online
Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications
Springer-Verlag, 2014
Format: PDF, Read online
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
Springer-Verlag, 2013
Format: PDF, Read online
All prices incl. VAT