Jürgen Taeger
Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren
Threats, Vulnerabilities, and Countermeasures
Steffen Timmann
Reelle Zahlen, Folgen und Reihen, stetige Funktionen, Funktionenfolgen, Differenzierbarkeit, Potenzreihen, elementare Funktionen, Riemann-Integral in IR
Threats, Vulnerabilities, and Countermeasures
Gerhard Merziger, Thomas Wirth
Repetitorium der höheren Mathematik
Threats, Vulnerabilities, and Countermeasures
Klaus Pohl
Requirements Engineering
Threats, Vulnerabilities, and Countermeasures
Roger Archer
Risk
Threats, Vulnerabilities, and Countermeasures
Herbert Burbiel
SOA & Webservices in der Praxis
Threats, Vulnerabilities, and Countermeasures
Rick F. van der Lans
SQL
Threats, Vulnerabilities, and Countermeasures
Luca Stulier
Schritt Für Schritt Zum App Millionär
Threats, Vulnerabilities, and Countermeasures
Philip Ackermann
Schrödinger programmiert Java
Threats, Vulnerabilities, and Countermeasures
Stephan Elter
Schrödinger programmiert Python
Threats, Vulnerabilities, and Countermeasures
Bruce Schneier
Secrets & lies
Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks
Threats, Vulnerabilities, and Countermeasures
Peter Thermos
Ari Takanen
description
This first comprehensive book to present the technologies, architectures, vulnerabilities and countermeasures for Voice over IP.
read more
pages
N/A
Year published
2008
Publisher
Addison-Wesley Professional
Issn
0-321-43734-9
Language
en
categories
id
IFI 252