Information technology. Security techniques. Refining software vulnerability analysis under GOST R ISO/IEC 15408 and GOST R ISO/IEC 18045. Part 1. Using of available information
Tractors, machinery for agricultural and forestry, powered lawn and garden equipment. System of symbols for designation of operating controls and means of illustration of information. Symbols
€10
Ask a question
Message sent
Your message has been sent. Our experts will respond you shortly. Thank you!