Author: Stefan Axelsson

Author's info and books

Information about author Stefan Axelsson from several data sources.

Author Search

Search for any author

AI-generated bio of "Stefan Axelsson":


Authors Results

Source: The Open Library

Authors called "Stefan Axelsson"

Search results for authors called Stefan Axelsson from The Open Library

Books Results

Source: The Open Library

Stefan Axelsson Books

Books writen by author Stefan Axelsson from The Open Library

1Variability of the Cranial And Dental Phenotype in William's Syndrome

By

“Variability of the Cranial And Dental Phenotype in William's Syndrome” Metadata:

  • Title: ➤  Variability of the Cranial And Dental Phenotype in William's Syndrome
  • Author:
  • Language: English

Access and General Info:

  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Variability of the Cranial And Dental Phenotype in William's Syndrome at online marketplaces:


2Understanding intrusion detection through visualization

By

Book's cover

“Understanding intrusion detection through visualization” Metadata:

  • Title: ➤  Understanding intrusion detection through visualization
  • Authors:
  • Language: English

Access and General Info:

  • First Year Published: 2005
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Understanding intrusion detection through visualization at online marketplaces:


3Understanding Intrusion Detection through Visualization (Advances in Information Security Book 24)

By

Book's cover

“Understanding Intrusion Detection through Visualization (Advances in Information Security Book 24)” Metadata:

  • Title: ➤  Understanding Intrusion Detection through Visualization (Advances in Information Security Book 24)
  • Authors:

Access and General Info:

  • First Year Published: 2006
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Understanding Intrusion Detection through Visualization (Advances in Information Security Book 24) at online marketplaces: