Information technology. Security techniques. Competence requirements for information security testers and evaluators. Part 1. Introduction, concepts and general requirements
The system of protection against fraud and counterfeiting. Performance criteria for authentication solutions used to combat counterfeiting of material goods
€10
Ask a question
Message sent
Your message has been sent. Our experts will respond you shortly. Thank you!