-
1Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook -
2Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook -
3Published in Springer eBooks (2015)Subjects: “...Systems and Data Security....”
Get full text
eBook -
4Published in Springer eBooks (2015)Subjects: “...Systems and Data Security....”
Get full text
eBook -
5Published in Springer eBooks (2015)Subjects: “...Systems and Data Security....”
Get full text
eBook -
6Published in Springer eBooks (2015)Subjects: “...Systems and Data Security....”
Get full text
eBook -
7
-
8
-
9
-
10
-
11
-
12Published in Springer eBooks (2013)Subjects: “...Systems and Data Security....”
Get full text
eBook -
13Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook -
14Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook -
15by Mouheb, Djedjiga, Debbabi, Mourad, Pourzandi, Makan, Wang, Lingyu, Nouh, Mariam, Ziarati, Raha, Alhadidi, Dima, Talhi, Chamseddine, Lima, VitorSubjects: “...Systems and Data Security....”
Published in Springer eBooks (2015)
Get full text
eBook -
16Published in Springer eBooks (2013)Subjects: “...Systems and Data Security....”
Get full text
eBook -
17Published in Springer eBooks (2013)Subjects: “...Systems and Data Security....”
Get full text
eBook -
18Published in Springer eBooks (2013)Subjects: “...Systems and Data Security....”
Get full text
eBook -
19Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook -
20Published in Springer eBooks (2014)Subjects: “...Systems and Data Security....”
Get full text
eBook
