5€¹ Rabatt bei Bestellungen per App

zum Einstieg

Secure Medical Da... - Securing Caite (S...

Secure Medical Data Transmission in Wireless Body Area Network (Buch) Secure Messaging on the Internet (eBook) Secure Mobile Ad-hoc Networks and Sensors (Buch) Secure Mobile Ad-hoc Networks and Sensors / Lecture Notes in Computer Science Bd.4074 (eBook) Secure Multi-Party Computation Against Passive Adversaries (Buch) Secure Multi-Party Computation Against Passive Adversaries (Buch) Secure Multi-Party Computation Against Passive Adversaries / Synthesis Lectures on Distributed Computing Theory (eBook) Secure Multi-Party E-Commerce Protocols / SpringerBriefs in Computer Science (eBook) Secure Multi-Party Non-Repudiation Protocols and Applications (Buch) Secure Multi-Party Non-Repudiation Protocols and Applications (Buch) Secure Multi-Party Non-Repudiation Protocols and Applications / Advances in Information Security Bd.43 (eBook) Secure Multiparty Computation and Secret Sharing (eBook) Secure Multiparty Computation and Secret Sharing (eBook) Secure Multiparty Key Agreements: Theory and Practice (Buch) Secure My Heart (Omega Securities, #2) / Omega Securities (eBook) Secure Networked Inference with Unreliable Data Sources (Buch) Secure Networked Inference with Unreliable Data Sources (eBook) Secure Networked Inference with Unreliable Data Sources (Buch) Secure Networking - CQRE (Secure) '99 (Buch) Secure Networking - CQRE (Secure) '99 / Lecture Notes in Computer Science Bd.1740 (eBook) Secure Networking: (Buch) Secure Oil and Alternative Energy (Buch) Secure Parent, Secure Child (eBook) Secure Password Policy. Current Situation and Solutions (eBook) Secure Payment Routing Protocol for Economic Systems Based on Blockchain (Buch) Secure Programming Cookbook for C and C++ (eBook) Secure Programming Cookbook for C and C++ (eBook) Secure Programming with Static Analysis (eBook) Secure Programming with Static Analysis (eBook) Secure Programming with Static Analysis, w. CD-ROM (Buch) Secure Public Key Infrastructure / Advances in Information Security Bd.20 (Buch) Secure Quantum Network Coding (Buch) Secure Quantum Network Coding Theory (Buch) Secure Quantum Network Coding Theory (eBook) Secure Quantum Network Coding Theory (Buch) Secure Recovery (eBook) Secure Recovery (eBook) Secure Relating (eBook) Secure Reviews and Set Yourself Up As a Reviewer IN A DAY / IN A DAY Series Bd.5 (eBook) Secure Roaming in 802.11 Networks (Buch) Secure Roaming in 802.11 Networks (eBook) Secure Routing In Wireless Mobile Ad Hoc Network (Buch) Secure Routing Protocols for Wireless Mesh Networks (Buch) Secure Routing Protocols in Mobile Ad Hoc Networks (Buch) Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks (eBook) Secure Routing by Bio-inspired Techniques - A Way from ICMN to ICMANET (Buch) Secure Routing in Mobile Ad-Hoc Networks: Attacks and Solutions (Buch) Secure Runway (Chase Security Series) / Chase Security Series (eBook) Secure Searchable Encryption and Data Management (eBook) Secure Searchable Encryption and Data Management (eBook) Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET (eBook) Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET (Buch) Secure Semantic Service-Oriented Systems (eBook) Secure Sensor Cloud / Synthesis Lectures on Algorithms and Software in Engineering (eBook) Secure Serial Port Communications and Telephony Dialing Systems (Buch) Secure Smart Embedded Devices, Platforms and Applications (Buch) Secure Smart Embedded Devices, Platforms and Applications (eBook) Secure Smart Embedded Devices, Platforms and Applications (Buch) Secure Software Design (Buch) Secure Software Development (Buch) Secure Stack for Clocks (Buch) Secure Steganography in Colored Images (Buch) Secure System Design and Trustable Computing (Buch) Secure System Design and Trustable Computing (eBook) Secure System Design and Trustable Computing (Buch) Secure Systems Development with UML (Buch) Secure Systems Development with UML (eBook) Secure Systems Development with UML (Buch) Secure Transaction Protocol Analysis (Buch) Secure Transaction Protocol Analysis / Lecture Notes in Computer Science Bd.5111 (eBook) Secure Transmission of Text through Images with Encryption Algorithms (Buch) Secure Treatment Outcomes (eBook) Secure Treatment Outcomes (eBook) Secure Virtualized Client Server Instant Messaging Through Port-Based (Buch) Secure VoIP Performance Measurement (Buch) Secure Voice Processing Systems against Malicious Voice Attacks (Buch) Secure Voice Processing Systems against Malicious Voice Attacks / SpringerBriefs in Computer Science (eBook) Secure Web Application Development (eBook) Secure Wireless Data Propagation Using Simulation of Li-Fi Technology (Buch) Secure Wireless Sensor Networks (Buch) Secure Wireless Sensor Networks (Buch) Secure Wireless Sensor Networks (Buch) Secure Wireless Sensor Networks / Advances in Information Security Bd.65 (eBook) Secure Woman (eBook) Secure Your Business (eBook) Secure Your Internet Use (eBook) Secure Your Legacy (eBook) Secure Your Legacy (eBook) Secure Your Network for Free (eBook) Secure Your Network for Free (Buch) Secure Your Node.js Web Application (eBook) Secure Your Node.js Web Application (eBook) Secure Your Retirement (eBook) Secure Your Retirement (eBook) Secure and Anonymous Routing for Mobile Adhoc Networks (Buch) Secure and Digitalized Future Mobility (eBook) Secure and Digitalized Future Mobility (eBook) Secure and Effective Government IT systems in 3rd World Country (Buch) Secure and Efficient Data Transmission for Cluster-Based WSN (Buch) Secure and Efficient IP Mobility Support for Aeronautical Communications (Buch) Secure and Fast OTP Authentication Protocol for Wireless Networks (Buch) Secure and Privacy-Preserving Data Communication in Internet of Things (Buch) Secure and Privacy-Preserving Data Communication in Internet of Things / SpringerBriefs in Electrical and Computer Engineering (eBook) Secure and Reliable Data Transmission in Wireless Body Area Networks (Buch) Secure and Resilient Software (eBook) Secure and Resilient Software Development (eBook) Secure and Resilient Software Development (eBook) Secure and Scalable NOSQL for the Applications Deployed in Cloud (Buch) Secure and Smart Internet of Things (IoT) (eBook) Secure and Smart Internet of Things (IoT) (eBook) Secure and Smart Internet of Things (IoT) (eBook) Secure and Tranquil Travel (eBook) Secure and Tranquil Travel (eBook) Secure and Trust Computing, Data Management (Buch) Secure and Trust Computing, Data Management, and Application (Buch) Secure and Trust Computing, Data Management, and Applications / Communications in Computer and Information Science Bd.186 (eBook) Secure and Trust Computing, Data Management, and Applications / Communications in Computer and Information Science Bd.187 (eBook) Secure and Trusted Checkpointing Recovery in Mobile Computing (Buch) Secure and Trusted Cyber Physical Systems (Buch) Secure and Trusted Cyber Physical Systems (Buch) Secure and Trusted Cyber Physical Systems / Smart Sensors, Measurement and Instrumentation Bd.43 (eBook) Secure and Trustworthy Cyberphysical Microfluidic Biochips (Buch) Secure and Trustworthy Cyberphysical Microfluidic Biochips (eBook) Secure and Trustworthy Cyberphysical Microfluidic Biochips (Buch) Secure and Trustworthy Service Composition (Buch) Secure and Trustworthy Service Composition / Lecture Notes in Computer Science Bd.8900 (eBook) Secure and Trustworthy Transportation Cyber-Physical Systems (Buch) Secure and Trustworthy Transportation Cyber-Physical Systems / SpringerBriefs in Computer Science (eBook) Secure by Design (eBook) Secure communication in oppnets using ECC (Buch) Secure communication with flipping substitute permutation algorithm (Buch) Secure data transmission between an NFC tag and an NFC enabled smartphone (eBook) Secure from Rash Assault (eBook) Secure in the Storm / Abingdon Press (eBook) Secure management system for website of E-library in a university (Buch) Secure mutual shared key Authentication system using MANETs (Buch) Secure the Shadow / Southern Messenger Poets (eBook) Secure the Soul (eBook) Secure your Mac, with Mac OS X Lion (eBook) Secure, Low-Power IoT Communication Using Edge-Coded Signaling (eBook) Secure, Low-Power IoT Communication Using Edge-Coded Signaling (Buch) Secure, Resilient, and Agile Software Development (eBook) SecureDigital Card "Tech-Line" 4GB 150x (Elektronik) SecureDigital Card Ultra II 2 GB, plus USB (Elektronik) SecureDigital High Capacity Card, 4GB + MicroMate Reader (Elektronik) Secured (The Shielded Series, #3) / The Shielded Series (eBook) Secured By The Seal (Mills & Boon Heroes) (Red, White and Built, Book 5) / Heroes (eBook) Secured Cloud-Based Framework for ICT Intensive Virtual Organisation (Buch) Secured Communication mechanism in Public Key Cryptography (Buch) Secured Credit , A Systems Approach (eBook) Secured Credit in Europe (eBook) Secured Credit in Europe (eBook) Secured Credit under English and American Law (eBook) Secured Credit, A Systems Approach, Sixth Edition (eBook) Secured Finance Law in China and Hong Kong (eBook) Secured Finance Transactions (eBook) Secured Heart (Timberon Cat, #1) / Timberon Cat (eBook) Secured Heart (Windy City, #2) / Windy City (eBook) Secured Lending in Eastern Europe (Buch) Secured Mail (Planet Valhalla, #2) / Planet Valhalla (eBook) Secured Toll Surveillance System (Buch) Secured Transactions (eBook) Secured Transactions (Speedy Study Guides) / Dot EDU (eBook) Secured Transactions Law Reform (eBook) Secured Transactions Law Reform (eBook) Secured Transactions Law Reform in Africa (eBook) Secured Transactions Law Reform in Africa (eBook) Secured Transactions Law in Asia (eBook) Secured Transactions Law in Asia (eBook) Secured by Grace... Sustained by Faith (eBook) Secured by Linda's Vampire (eBook) Secured by the Alien Space Warrior: A Dhasu Alien Romance (A SciFi Alien Romance Series, #9) / A SciFi Alien Romance Series (eBook) Secured by the SEAL / Red, White and Built (eBook) Secured e-voting system (Buch) Securely Attached (Buch) Securely Attached / Attachment Nerd (eBook) Securin (Buch) Securing 'the Homeland' (eBook) Securing 'the Homeland' (eBook) Securing .NET Applications (Buch) Securing 5G and Evolving Architectures (eBook) Securing 5G and Evolving Architectures (eBook) Securing AJAX Applications (Buch) Securing Africa (eBook) Securing Africa (eBook) Securing Africa (eBook) Securing Africa (eBook) Securing Africa's Land for Shared Prosperity (eBook) Securing Ajax Applications (eBook) Securing Ajax Applications (eBook) Securing Amazon Web Services (eBook) Securing America's Covenant with God (eBook) Securing America's Passenger-Rail Systems (eBook) Securing American Elections / Elements in Campaigns and Elections (eBook) Securing American Elections / Elements in Campaigns and Elections (eBook) Securing American Independence (eBook) Securing Appropriate Education Provision for Children with Autism Spectrum Disorders (eBook) Securing Australia's Future (eBook) Securing Australia's Future (eBook) Securing Avery (Delta Team Two, #5) / Delta Team Two (eBook) Securing Baritone, Bass-Baritone, and Bass Voices (eBook) Securing Baritone, Bass-Baritone, and Bass Voices (eBook) Securing Best Practice (eBook) Securing Biometrics Applications (eBook) Securing Biometrics Applications (Buch) Securing Biometrics Applications (Buch) Securing Blockchain Networks (eBook) Securing Blockchain Networks like Ethereum and Hyperledger Fabric (eBook) Securing Borders, Securing Power (eBook) Securing Caite (SEAL of Protection: Legacy, #1) / SEAL of Protection: Legacy (eBook)