1
Izdano 2013
Kazalo: ...-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd...
Polni tekst
Elektronski eKnjiga
2
Izdano 2015
Kazalo: ...BORM-II and UML as accessibility process in knowledge and business modelling -- Planning-Context...
Polni tekst
Elektronski eKnjiga
3
od Horstmann, Cay S.
Izdano 2013
Cover image
Knjiga