نتایج جستجو

Perfect Passwords. Selection, Protection, Authentication
Mark Burnett, 2006
Cyber Security and IT Infrastructure Protection
John R. Vacca, 2013
Cyber Security and IT Infrastructure Protection
John R. Vacca, 2013
Cyber Security and IT Infrastructure Protection
John R. Vacca, 2013
Computers, Privacy and Data Protection: an Element of Choice
Katja de Vries, 2011
European Data Protection: Coming of Age
Rachel L. Finn, 2013
European Data Protection: In Good Health?
Arnold Roosendaal (auth.), 2012
Reforming European Data Protection Law
Serge Gutwirth, 2015
Reinventing Data Protection?
P. De Hert, 2009
Reinventing Data Protection?
P. De Hert, 2009
Electromagnetic Biointeraction: Mechanisms, Safety Standards, Protection Guides
G. d’Ambrosio (auth.), 1989
Biotechnology for Crop Protection
Paul A. Hedin, Julius J. Menn,, 1988
Data protection: governance, risk management, and compliance
David G Hill, 2009
Phytochemicals in Human Health Protection, Nutrition, and Plant Defense
Gordon M. Cragg, 1999