1
Published 2013
Table of Contents: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ... Network and Information Security -- Application of Genetic Algorithm for Component Optimization to Deploy...
View full text
Electronic eBook