LitRes
Otsi
Sisestage otsimiseks kolm või enam tähte
Logi sisse
6
Kas teadsite, et...
LitResiga liitudes näitate hoolivust keskkonna suhtes
Registreeru
Logi sisse
Minu raamatud
Kõik
Minu raamatud
Vaadatud
Salvestatud
Ostukorv
Loendid
Meist
Ettevõttest & Kontakt
Žanrid
Uued
Populaarsed
Audioraamatud
Soovitused
Sooduskood
Kõik 345 žanrit
Raamatud
Väliskirjandus
Arvutialane väliskirjandus
Arvutialane väliskirjandus
Alažanrid
Tase kõrgemal
(Väliskirjandus)
Välismaised detektiivilood
Majandusalane väliskirjandus
Välisklassika
Välis-ajakirjandus
Psühholoogia-alane väliskirjandus
Välisriigi luule
Kaasaegne väliskirjandus
Välis-ilukirjandus
Välismaine romantika
Välisriigi õppekirjanduse
Välismaine esoteeriline kirjandus
Välismaised lasteraamatud
Arvutialane väliskirjandus
Kultuuri- ja kunstialane väliskirjandus
Välisriigi käsiraamatud
Välis-näitekirjandus
Välismaine põnevik
Välismaine teatmekirjandus
Välismaine põnevik
Välismaine ulmekirjandus
Vana väliskirjandus
Programmeerimine
Raamatud arvutitest
Internet
Arvutiteatmikud
Programmid
Arvutustehnika
Andmebaasid
информационная безопасность
Välismaine huumor
Religiooni- ja esoteerikaalane väliskirjandus
Religioosne väliskirjandus
Operatsioonisüsteemid ja võrgud
Soovitused
Uued
Populaarsed
E-raamatud ja audioraamatud
E-raamatud ja audioraamatud
E-raamatud
2677
Audioraamatud
16
kõigis keeltes
2693
albaania keeles
1
birma keeles
1
bulgaaria keeles
2
hiina keeles
1
hispaania keeles
19
hollandi keeles
1
inglise keeles
1762
itaalia keeles
6
poola keeles
2
portugali keeles
4
prantsuse keeles
5
saksa keeles
50
türgi keeles
2
ukraina keeles
1
vene keeles
836
Conflicts, Crimes and Regulations in Cyberspace
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cybersecurity and Local Government
Donald F. Norris
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Information Systems Management
Claudio Vitari
0
Blockchain for Distributed Systems Security
0
Multi-Processor System-on-Chip 2
0
Hyperdocumentation
Olivier Le Deuff
0
Diagnosis and Fault-tolerant Control Volume 2
0
Corporate Cybersecurity
John Jackson
0
The Official (ISC)2 Guide to the CISSP CBK Reference
Kevin Henry
0
Multimedia Security 2
William Puech
0
Cyber Security and Digital Forensics
2
IP Address Management
Michael Dooley
0
Security, Privacy, and Digital Forensics in the Cloud
0
Multi-Processor System-on-Chip 2
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Building Secure Cars
Dennis Kengo Oka
0
Cybersecurity and Decision Makers
Marie De Fréminville
0
Smart Buildings, Smart Communities and Demand Response
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cyber Security and Network Security
0
Corporate Cybersecurity
John Jackson
0
Cybersecurity in Humanities and Social Sciences
0
Data Control
Jean-Louis Monino
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Conflicts, Crimes and Regulations in Cyberspace
0
Security Designs for the Cloud, IoT, and Social Networking
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Chance, Calculation and Life
0
Cyber Security and Network Security
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Diagnosis and Fault-tolerant Control 1
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Cloud Technologies
Roger McHaney
0
Smart Buildings, Smart Communities and Demand Response
0
0
0
Tekst
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
Tekst
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Claudio Vitari
Information Systems Management. Governance, Urbanization and Alignment
0
0
PDF
Blockchain for Distributed Systems Security
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
Tekst
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Kevin Henry
The Official (ISC)2 Guide to the CISSP CBK Reference
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
PDF
Michael Dooley
IP Address Management
0
0
PDF
Security, Privacy, and Digital Forensics in the Cloud
0
0
Tekst
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
Tekst
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Dennis Kengo Oka
Building Secure Cars. Assuring the Automotive Software Development Lifecycle
0
0
Tekst
Marie De Fréminville
Cybersecurity and Decision Makers. Data Security and Digital Trust
0
0
PDF
Smart Buildings, Smart Communities and Demand Response
0
0
Tekst
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Cyber Security and Network Security
0
0
Tekst
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Cybersecurity in Humanities and Social Sciences. A Research Methods Approach
0
0
Tekst
Jean-Louis Monino
Data Control. Major Challenge for the Digital Society
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Security Designs for the Cloud, IoT, and Social Networking
0
0
Tekst
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Chance, Calculation and Life
0
0
Tekst
Cyber Security and Network Security
0
0
PDF
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Tekst
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Roger McHaney
Cloud Technologies. An Overview of Cloud Computing Technologies for Managers
0
0
Tekst
Smart Buildings, Smart Communities and Demand Response
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
68
Järgmine
Kasutame
küpsiseid
, et võimaldada veebilehe kiirem ja mugavam kasutamine.
Lisateave
Sain aru