Vendeur : Ammareal, Morangis, France
EUR 3,99
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierSoftcover. Etat : Bon. Légères traces d'usure sur la couverture. Edition 2003. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Slight signs of wear on the cover. Edition 2003. Ammareal gives back up to 15% of this item's net price to charity organizations.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres d'occasion à partir de EUR 7,49
Trouvez également Couverture souple Edition originale
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
EUR 0,97
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Fine.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 92,95
Offres d'occasion à partir de EUR 6,31
Trouvez également Couverture souple
Vendeur : The Guru Bookshop, Hereford, Royaume-Uni
EUR 9,78
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. FIRST EDITION with dust jacket - rare and collectable - will send out 1 st class post.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres d'occasion à partir de EUR 16,90
Trouvez également Couverture rigide
EUR 12,60
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.2.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 47,98
Offres d'occasion à partir de EUR 20,21
Trouvez également Couverture souple Edition originale
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Edition originale
EUR 7,60
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. 1st. Used book that is in excellent condition. May show signs of wear or have minor defects.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres d'occasion à partir de EUR 27,61
Trouvez également Couverture rigide Edition originale
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 17,95
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Research Paper (undergraduate) from the year 2015 in the subject Computer Science - IT-Security, , language: English, abstract: This paper investigates the rise in popularity of MANETs (Mobile Ad Hoc Networks) and discusses their valuable role in all manner of situations that require a rapid deployment, and a highly flexible and dynamic approach to mobile networking. The paper examines the advantages, along with the limitations of MANETs, and identifies many of the current security concerns. Examining these concerns has exposed DoS attacks as being of high priority when planning for, and provisioning a secure network. The role of the IDS has been identified as being a crucial element in the security requirements.However, it has also been identified that the IDS is not a single solution, and that there are a number of options available, each suited to a particular scenario. Many of the IDS solutions have been identified as being complex and difficult to administer and maintain, and can lead to aggressive resource consumption.In conclusion to this paper it is felt that there is further work to be done to `develop a low resource intensive node based IDS design methodology to help protect MANET nodes from DoS attacks'.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 28,94
Trouvez également Couverture souple
EUR 17,95
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Academic Paper from the year 2019 in the subject Computer Science - IT-Security, grade: 2.1, Bochum University of Applied Sciences (Information Technology), course: IT security, language: English, abstract: There are various advanced intelligent home security applications operating with different systems. However, this report focuses on an effective, practical, and economically efficient GSM module integrated with IR sensors. This system is designed to detect intrusions and respond through alarm systems that restrict entry by activating various lock mechanisms to secure the premises. The system functionality of this embedded home security application is integrated with facial recognition software and Artificial Intelligence technology such as voice detection and motion sensors. The functionality of this system is easy to understand thus the users do not require advanced knowledge and skills in Information Technology. The system is user-friendly in terms of power consumption, maintenance, optimization, and allows for device interoperability.The proposed home security system integrates various components and subsystems of the IR sensors into a specially designed GSM module to come up with a functional single automated architecture that functions effectively in a wide range of intelligent home environments (Isa and Sklavos, 2017). The figure below illustrates the architecture diagram of the home security system with the design set up and connectivity of its various modules.In the current era of modern technology, the issue of home security is paramount as the burglars advanced their intrusion techniques using various applications of cutting-edge technology. The need to secure our homes arises due to due to the need to protect various important documents, property, and life. This has necessitated the development of intelligent systems that are implemented through application-based technologies to automate home security systems. The Idea of Intelligent homes is based on digital systems such as wireless technologies that are fitted with Artificial Intelligence Systems to perform certain predetermined tasks. The AI systems provide the homeowners with real-time feedback and are able to respond accordingly to various security concerns.The advancement in technology has been responsible for the development of digital home security applications allow for real-time communication and emergency response by monitoring factors such as temperature and home lighting. The automated home security systems additionally secure homes by integrating the automated user-authentication software that prevents break-ins and track illegal intrusions within and around the home.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 28,94
Trouvez également Couverture souple
Edité par Butterworth & Co, Boston, 1988
ISBN 10 : 0409900303 ISBN 13 : 9780409900309
Langue: anglais
Vendeur : Peter Rhodes, Southampton, Royaume-Uni
EUR 9,78
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHard Cover. Etat : Very Good +. Second Edition. 240 x 160mm. pp. 462. English text. A comprehensive and updated volume on intrusion detection systems and implementation. Bound in original blue boards with white lettering to spine and brown and light blue lettering to front cover. Boards and pages clean and tight. 1kg.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 164,61
Offres d'occasion à partir de EUR 29,36
Trouvez également Couverture rigide Edition originale
Vendeur : AwesomeBooks, Wallingford, Royaume-Uni
EUR 30,08
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : New. Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (Advances in Information Security) Brand new item sourced directly from publisher. Packed securely in tight packaging to ensure no damage. Shipped from warehouse on same/next day basis.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 33,63
Offres d'occasion à partir de EUR 208,10
Trouvez également Couverture rigide
Vendeur : Basi6 International, Irving, TX, Etats-Unis
EUR 32,06
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 35
Offres d'occasion à partir de EUR 87,11
Trouvez également Couverture souple
EUR 34,68
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. 2008th Edition. Ships from the UK. Used book that is in excellent condition. May show signs of wear or have minor defects.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 41,68
Offres d'occasion à partir de EUR 38,83
Trouvez également Couverture rigide
Edité par INDEPENDENTLY PUBLISHED, 2018
ISBN 10 : 1718139578 ISBN 13 : 9781718139572
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 33,51
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 43,21
Trouvez également Couverture souple
Edité par INDEPENDENTLY PUBLISHED, 2018
ISBN 10 : 1980913358 ISBN 13 : 9781980913351
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 40,95
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 43,24
Trouvez également Couverture souple
Vendeur : Pórtico [Portico], ZARAGOZA, Espagne
EUR 36
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTapa blanda. Etat : New. LOPEZ GONZALEZ, E. / C. MENDAÑA CUERVO, EDS.: PROCEEDINGS OF FIRST INTERNATIONAL WORKSHOP ON INTELLIGENT SYSTEMS FOR INTRUSION DETECTION AND FACING MALWARE. 978-84-9773-068-6, UNIV. DE LEON, 2003. Nuevo 720 gr. Libro.
Edité par CreateSpace Independent Publishing Platform, 2014
ISBN 10 : 1494749696 ISBN 13 : 9781494749699
Langue: anglais
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 18,11
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Print on Demand.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 25,14
Trouvez également Couverture souple
Edité par Createspace Independent Publishing Platform, 2017
ISBN 10 : 154489953X ISBN 13 : 9781544899534
Langue: anglais
Vendeur : CitiRetail, Stevenage, Royaume-Uni
EUR 25,65
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. This publication provides introductory technical guidance for professional engineers, construction managers and facility security managers interested in intrusion detection systems. Here is what is discussed: 1. OVERVIEW, 2. SYSTEM CONFIGURATION, 3. INTERIOR SENSORS, 4. EXTERIOR SENSORS, 5. VIDEO ANALYTICS FOR IDS, 6. "AND/OR" CONFIGURATION OPTIONS, 7. IDS DESIGN GUIDANCE, 8. SUMMARY. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 37,77
Trouvez également Couverture souple
Edité par Createspace Independent Publishing Platform, 2017
ISBN 10 : 1546434801 ISBN 13 : 9781546434801
Langue: anglais
Vendeur : CitiRetail, Stevenage, Royaume-Uni
EUR 25,65
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. This publication provides introductory technical guidance for electrical engineers and other professional engineers, security managers and construction managers interested in intrusion detection security systems. Here is what is discussed: 1. OVERVIEW, 2. SYSTEM CONFIGURATION, 3. INTERIOR SENSORS, 4. EXTERIOR SENSORS, 5. VIDEO ANALYTICS FOR IDS, 6. "AND/OR" CONFIGURATION OPTIONS, 7. IDS DESIGN GUIDANCE, 8. SUMMARY. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 37,34
Trouvez également Couverture souple
Edité par Springer US, Springer New York Apr 2013, 2013
ISBN 10 : 1461350913 ISBN 13 : 9781461350910
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 42,75
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 160 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 53,75
Trouvez également Couverture souple
Edité par CreateSpace Independent Publishing Platform, 2011
ISBN 10 : 1497307627 ISBN 13 : 9781497307629
Langue: anglais
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 24,44
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Print on Demand.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 31,47
Trouvez également Couverture souple
Edité par LAP LAMBERT Academic Publishing Jan 2014, 2014
ISBN 10 : 3659515108 ISBN 13 : 9783659515101
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 49,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always with vulnerabilities. This has created Intrusion Detection Systems to be developed that complement traditional approaches. However, with the advancement of computer technology, the behavior of intrusions has become complex that makes the work of security experts hard to analyze and detect intrusions. In order to address these challenges, data mining techniques have become a possible solution. However, the performance of data mining algorithms is affected when no optimized features are provided. This is because, complex relationships can be seen as well between the features and intrusion classes contributing to high computational costs in processing tasks, subsequently leads to delays in identifying intrusions. Feature selection is thus important in detecting intrusions by allowing the data mining system to focus on what is really important.Books on Demand GmbH, Überseering 33, 22297 Hamburg 100 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 55,85
Trouvez également Couverture souple
Edité par LAP LAMBERT Academic Publishing Okt 2014, 2014
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 51,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 53,57
Offres d'occasion à partir de EUR 142,10
Trouvez également Couverture souple
Edité par LAP LAMBERT Academic Publishing Jun 2016, 2016
ISBN 10 : 3659888311 ISBN 13 : 9783659888311
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 54,90
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Information security becomes a major issue in the recent decade due to wide spread of the network and Internet that consider as insecure transmission media, from this point of view security participants focus their effort to provide best method implementing information security, one of these methods is Intrusion Detection System (IDS). IDS is a software with the functions of detecting, identifying and responding to unauthorized or abnormal activities on a target system. The IDS is used by organizations to provide security for the valuable information resources (information assets). Unfortunately IDS has some errors that badly effects on the organization security, in this work, Artificial Neural Network (ANN) is used for implementing different types of intrusion detection system and improving its performance by decreasing the errors and increasing the classification and detection rates.Books on Demand GmbH, Überseering 33, 22297 Hamburg 108 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 55,85
Trouvez également Couverture souple
Edité par LAP LAMBERT Academic Publishing Okt 2011, 2011
ISBN 10 : 3846525103 ISBN 13 : 9783846525104
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 59
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -This book has focussed on designing high performance Network Intrusion Detection Systems models, we have presented two designs to address limitations of Packet Loss and Low Detection Rate. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switch overs between nodes in case the traffic exceeds pre-defined threshold. Comparator Logic enhances the overall efficiency by recovering lost data and analyzing it to identify threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset.Books on Demand GmbH, Überseering 33, 22297 Hamburg 132 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 58,96
Trouvez également Couverture souple
Edité par LAP LAMBERT Academic Publishing Jun 2012, 2012
ISBN 10 : 3659156310 ISBN 13 : 9783659156311
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 59
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -AIS is a generic computational paradigm that can be applied to any field, but computer security, being naturally analogous domain to human immune system, is more popular among AIS applications. The particular principles and features of the immune system are used in the development of the intrusion and malware detection framework. The authors have presented a concise literature review showing good understanding of the topic area about Artificial Immune Systems (AISs). The book has suitable technical content which the authors described with clarity of expression and relevant knowledge. The authors also make good effort in describing the technical concepts in simple and easily to understood language. The proposed two systems IIDS and IPEMDS scheme's are soundly designed with good approaches and solid arguments. The technical information presented in this book is interesting and will be useful to researchers and practitioners.Books on Demand GmbH, Überseering 33, 22297 Hamburg 148 pp. Englisch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 58,96
Trouvez également Couverture souple
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 73,24
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 77,97
Trouvez également Couverture souple
Edité par Butterworth Publlishers, 1981
Vendeur : BookDepart, Shepherdstown, WV, Etats-Unis
EUR 10,16
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : UsedGood. ISBN: 0-409-95025-2; Hardcover; fading, light edge wear to exterior; small puncture on front cover; otherwise in good condition with clean text, firm binding.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 69,06
Autre deviseQuantité disponible : 3 disponible(s)
Ajouter au panierEtat : New.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 79,56
Offres d'occasion à partir de EUR 82,19
Trouvez également Couverture souple
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 38
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -Inhaltsangabe:Einleitung:Computersicherheit ist in der heutigen Zeit nicht nur wegen den sich häufenden Medienberichten über gelungene Einbruchsversuche ein vieldiskutiertes Thema. Eine Folge davon ist ein deutlicher Anstieg der Nachfrage an Sicherheitsprodukten, zu denen auch Intrusion Detection Systeme zählen. Übereinstimmend wird geschätzt, daß sich durch deren Verwendung ein höheres Niveau der Systemsicherheit erreichen läßt. 1999 wurde in 37% aller Unternehmen, für die Sicherheit von Bedeutung ist, ID-Produkte benutzt (Vorjahr 29%). Das Sicherheitsniveau dieser Produkte hängt unter anderem wesentlich von der Effizienz des Zusammenwirkens mit anderen Produkten wie z.B. Firewalls ab. Dieses Zusammenwirken ist bisher teilweise noch nicht vorhanden, bzw. noch nicht optimiert. In der vorliegenden Diplomarbeit wird nun ein Ansatz vorgestellt, der durch die aktive Verknüpfung der Komponenten Firewall und IDS die Effizienz beider Systeme steigern und zusätzliche Möglichkeiten erschließen soll. Da diese Kopplung Implikationen auf Design und auszuwählende Mechanismen des zu integrierenden IDS hat, wird hier ein Modell vorgestellt, welches für diesen Zweck optimiert wurde. Die vorliegende Arbeit enthält weiterhin eine detaillierte Beschreibung der exemplarischen Implementierung dieses Modells, sowie die Präsentation und Bewertung erster Einsatzerfahrungen.Inhaltsverzeichnis:Inhaltsverzeichnis:Abbildungsverzeichnis 4Tabellenverzeichnis4Inhaltsverzeichnis5Einleitung71.Sicherh eit in Computersystemen81.1Sicherheitslücken81.2Grundsätzliche Vorgehensweise eines Eindringlings91.3Angriffsarten91.4Gegenmaßnahmen112.Intrusion Detection Systeme122.1IDS-Eigenschaften122.2Klassifizierung von Intrusion Detection Systemen132.3Arbeitsweise eines IDS142.3.1Datenselektion142.3.2Datenanalyse162.3.3IDS-Sprachen192.4Kombination von Firewall und IDS223.Entwurf eines Firewall-IDS243.1Theoretische Modelle243.1.1Das ECA-Modell243.1.2Ein generisches Intrusion Detection Modell273.2Grundlegende IDS-Entwurfskonzepte283.2.1Modellauswahl283.2.2Typ des zu entwerfenden Systems283.2.2Leistungsmerkmale des zu entwerfenden Systems293.2.3Auswahl des Angriffserkennungsmechanismus303.2.4Auswahl der Datenbereitstellung313.2.5Integration der Analysemethoden323.2.6Konzeption der Endlichen Automaten für die Mustererkennung323.2.7Entwurf der IDS-Sprache323.3IDS-spezifische Konkretisierung des ECA-Modells353.4Integration des IDS [¿]Diplomica Verlag, Hermannstal 119k, 22119 Hamburg 76 pp. Deutsch.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 48,99
Offres d'occasion à partir de EUR 148,21
Trouvez également Couverture souple
Edité par Pearson Education, Limited, 2003
ISBN 10 : 0131090852 ISBN 13 : 9780131090859
Langue: anglais
Vendeur : TextbookRush, Grandview Heights, OH, Etats-Unis
EUR 41,63
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : Good. Expedited orders RECEIVED in 1-5 business days within the United States. Orders ship SAME or NEXT business day. We proudly ship to APO/FPO addresses. 100% Satisfaction Guaranteed!
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 57,29
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Plus de choix d'achat de la part d'autres vendeurs sur AbeBooks
Offres neuf à partir de EUR 50,99
Trouvez également Couverture souple