Results
|
201.
|
|
Image from Amazon.com
|
|
|
202.
|
|
Image from Amazon.com
|
|
|
203.
|
|
Image from Amazon.com
|
|
|
204.
|
|
Image from Amazon.com
|
|
|
205.
|
|
Image from Amazon.com
|
|
|
206.
|
|
Image from Amazon.com
|
|
|
207.
|
|
Image from Amazon.com
|
|
|
208.
|
|
Image from Amazon.com
|
|
|
209.
|
|
Image from Amazon.com
|
|
|
210.
|
|
Image from Amazon.com
|
|
|
211.
|
|
Image from Amazon.com
|
|
|
212.
|
|
Image from Amazon.com
|
|
|
213.
|
|
Image from Amazon.com
|
|
|
214.
|
|
Image from Amazon.com
|
|
|
215.
|
|
Image from Amazon.com
|
|
|
216.
|
|
Image from Amazon.com
|
New Approaches for Security, Privacy and Trust in Complex Environments [electronic resource] : Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa / edited by Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms. by Series: IFIP International Federation for Information Processing ; 232Publisher: Boston, MA : Springer US, 2007
In:
Springer eBooks
Availability: No items available.
|
|
217.
|
|
Image from Amazon.com
|
|
|
218.
|
|
Image from Amazon.com
|
|
|
219.
|
|
Image from Amazon.com
|
|
|
220.
|
|
Image from Amazon.com
|
|