Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

نتائج البحث

Filter
  • 1-10 ل  23 نتائج ل ""COMPUTER hacking""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Book

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

  • Source: ICT Critical Infrastructures and Society ; IFIP Advances in Information and Communication Technology ; page 226-236 ; ISSN 1868-4238 1868-422X ; ISBN 9783642333316 9783642333323

تفاصيل العنوان

×
  • 1-10 ل  23 نتائج ل ""COMPUTER hacking""