It looks like you're offline.
Open Library logo
additional options menu
Last edited by ImportBot
July 29, 2014 | History

Heinrich Kersten

We need a photo of Heinrich Kersten

11 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Der IT Security Manager: Expertenwissen für jeden IT-security-Manager ; von namhaften Autoren praxisnah vermittelt

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: der Weg zur Zertifizierung

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Innovativer Datenschutz

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheit in der Informationstechnik: Einführung in Probleme, Konzepte und Lösungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Über die gleichmässige Approximierbarkeit harmonischer Funktionen in regulären Gebieten einschliesslich des Randes

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheitsaspekte bei der Vernetzung von Unix-Systemen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Business Continuity und IT-Notfallmanagement: Grundlagen, Methoden und Konzepte

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: IT-Sicherheitsmanagement nach der neuen ISO 27001: ISMS, Risiken, Kennziffern, Controls

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: ISO 27001 : 2022/2023: Management der Informationssicherheit Nach Den Aktuellen Standards

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheitseigenschaften der Betriebssysteme 386/ix und SCO-Unix

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheit in Informationssystemen: Proceedings des gemeinsamen Kongresses SECUNET '91 : Sicherheit in netzgestützten Informationssystemen (des Bifoa) und 2. Deutsche Konferenz über Computersicherheit (des BSI)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
July 29, 2014 Created by ImportBot import new book