Hardwarebasierte Computersicherheitstechniken zur Besiegung von Hackern: Von der Biometrie bis
162,48 €
Finally, it concludes with two examples of security systems put into practice. Cryptography Approaches and Attacks. Key Generation and Distribution Approaches and Attacks. The Qualities of Workable Security Solutions.
Jetzt bei Ebay: