Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/30813Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Bauer, Lujo | - |
| dc.contributor.author | Küsters, Ralf | - |
| dc.date.accessioned | 2023-04-13T12:08:57Z | - |
| dc.date.available | 2023-04-13T12:08:57Z | - |
| dc.date.issued | 2018 | - |
| dc.identifier.citation | https://doi.org/10.1007/978-3-319-89722-6 | en_US |
| dc.identifier.isbn | 978-3-319-89722-6 | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/30813 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Springer Cham | en_US |
| dc.title | Principles of Security and Trust | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | 0.1 Data Processing & Computer Science | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Principles of Security and Trust (2).pdf | 359.94 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.