Hardwarebasierte Computersicherheitstechniken zur Niederlage von Hackern: Von Biometrie t
166,79 €
Finally, it concludes with two examples of security systems put into practice. Cryptography Approaches and Attacks. Key Generation and Distribution Approaches and Attacks. The Qualities of Workable Security Solutions.
Jetzt bei Ebay: