Results
|
261.
|
|
Image from Amazon.com
|
|
|
262.
|
|
Image from Amazon.com
|
|
|
263.
|
|
Image from Amazon.com
|
|
|
264.
|
|
Image from Amazon.com
|
|
|
265.
|
|
Image from Amazon.com
|
|
|
266.
|
|
Image from Amazon.com
|
|
|
267.
|
|
Image from Amazon.com
|
|
|
268.
|
|
Image from Amazon.com
|
|
|
269.
|
|
Image from Amazon.com
|
|
|
270.
|
|
Image from Amazon.com
|
|
|
271.
|
|
Image from Amazon.com
|
|
|
272.
|
|
Image from Amazon.com
|
|
|
273.
|
|
Image from Amazon.com
|
|
|
274.
|
|
Image from Amazon.com
|
|
|
275.
|
|
Image from Amazon.com
|
|
|
276.
|
|
Image from Amazon.com
|
|
|
277.
|
|
Image from Amazon.com
|
Information Security [electronic resource] : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings / edited by Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee. by Series: Lecture Notes in Computer Science ; 5222Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
278.
|
|
Image from Amazon.com
|
|
|
279.
|
|
Image from Amazon.com
|
|
|
280.
|
|
Image from Amazon.com
|
|