1
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ...BORM-II and UML as accessibility process in knowledge and business modelling -- Planning-Context...
View full text
Electronic eBook
3
by Horstmann, Cay S.
Published 2013
Cover image
Book