ARENA 发表于 2025-3-25 04:13:26

IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/i/image/465536.jpg

otic-capsule 发表于 2025-3-25 07:47:52

http://reply.papertrans.cn/47/4656/465536/465536_22.png

Chemotherapy 发表于 2025-3-25 14:40:42

his family; and through the literary afterlives of texts—specifically, his appropriation of canonical classical texts. Drawing on approaches and concepts from memory studies, Piavanini considers Heaney’s late work to develop an analysis of poetry as a vehicle of memory..

Insul岛 发表于 2025-3-25 18:20:27

Jean Hitchings his family; and through the literary afterlives of texts—specifically, his appropriation of canonical classical texts. Drawing on approaches and concepts from memory studies, Piavanini considers Heaney’s late work to develop an analysis of poetry as a vehicle of memory..

Chauvinistic 发表于 2025-3-25 21:10:38

Shiuh-Jeng Wang,Le-Pond Chin,Jin-Fu Chang,Ywh-Ren Tsaimotion. is a comprehensive review of international perspectives on cross-cultural exploration of emotions, and will be a useful resource for researchers in anthropology, sociology, psychology, and communication studies..978-3-030-58440-5978-3-030-58438-2

无可争辩 发表于 2025-3-26 01:53:27

motion. is a comprehensive review of international perspectives on cross-cultural exploration of emotions, and will be a useful resource for researchers in anthropology, sociology, psychology, and communication studies..978-3-030-58440-5978-3-030-58438-2

ANN 发表于 2025-3-26 07:33:47

en dominated by historical study, and contributes a significant case study to the scholarship on global cultural mobilities..978-3-031-39261-0978-3-031-39259-7Series ISSN 2946-4838 Series E-ISSN 2946-4846

isotope 发表于 2025-3-26 12:02:44

http://reply.papertrans.cn/47/4656/465536/465536_28.png

让步 发表于 2025-3-26 15:51:20

1868-4238 21st century. It will be essential readingfor informationtechnology security specialists, computerprofessionals, EDPmanagers, EDP auditors, managers, researchers andstudents working onthe subject.978-1-5041-2919-0Series ISSN 1868-4238 Series E-ISSN 1868-422X

Callus 发表于 2025-3-26 17:05:55

The Use of Business Process Models for Security Design in Organisationsss. Moreover, security effort and costs will be reduced because BPMs must not be specified for security reasons. BPMs are a result of management activities and therefore, existing resources from a security point of view.
页: 1 2 [3] 4
查看完整版本: Titlebook: Information Systems Security; Facing the informati Sokratis K. Katsikas,Dimitris Gritzalis Book 1996 IFIP International Federation for Info