Explore: Chipkarte
Discover books, insights, and more — all in one place.
Learn more about Chipkarte with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “chipkarte”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Tron
Tod eines Hackers
By Burkhard Schröder

“Tron” Metadata:
- Title: Tron
- Author: Burkhard Schröder
- Language: ger
- Number of Pages: Median: 221
- Publisher: Rowohlt
- Publish Date: 1999
- Publish Location: Reinbek bei Hamburg
“Tron” Subjects and Themes:
- Subjects: Hacker - Kriminalfall - Computerkriminalität - Chipkarte
- People: Boris Floricic - Tron (Hacker)
- Places: Berlin
- Time: 1998
Edition Identifiers:
- The Open Library ID: OL25562080M
- Online Computer Library Center (OCLC) ID: 76077925
- All ISBNs: 349960857X - 9783499608575
First Setence:
"Wer gegen finstere Mächte kämpft, hat die Sympathien des Publikums auf seiner Seite."
Author's Alternative Names:
"Burk"Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Tron at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Chipkarten als Sicherheitswerkzeug
By Albrecht Beutelspacher

“Chipkarten als Sicherheitswerkzeug” Metadata:
- Title: ➤ Chipkarten als Sicherheitswerkzeug
- Author: Albrecht Beutelspacher
- Language: ger
- Publisher: Springer Berlin Heidelberg
- Publish Date: 1991
- Publish Location: Berlin, Heidelberg
“Chipkarten als Sicherheitswerkzeug” Subjects and Themes:
- Subjects: Datensicherung - Chipkarte
Edition Identifiers:
- The Open Library ID: OL27024135M
- Online Computer Library Center (OCLC) ID: 863871257
- All ISBNs: 3642934951 - 9783642934957
Access and General Info:
- First Year Published: 1991
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Chipkarten als Sicherheitswerkzeug at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Chipkarten
By Patrick Horster

“Chipkarten” Metadata:
- Title: Chipkarten
- Author: Patrick Horster
- Language: ger
- Publisher: Vieweg+Teubner Verlag
- Publish Date: 1998
- Publish Location: Wiesbaden
“Chipkarten” Subjects and Themes:
- Subjects: Chipkarte
Edition Identifiers:
- The Open Library ID: OL27024136M
- Online Computer Library Center (OCLC) ID: 863952900
- All ISBNs: 9783322892034 - 3322892034
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Chipkarten at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Chipkarten-Systeme erfolgreich realisieren
By Stephen Fedtke

“Chipkarten-Systeme erfolgreich realisieren” Metadata:
- Title: ➤ Chipkarten-Systeme erfolgreich realisieren
- Author: Stephen Fedtke
- Language: ger
- Publisher: Vieweg+Teubner Verlag
- Publish Date: 1996
- Publish Location: Wiesbaden
“Chipkarten-Systeme erfolgreich realisieren” Subjects and Themes:
- Subjects: ➤ Chipkarte - Kartengesteuertes Zahlungssystem
Edition Identifiers:
- The Open Library ID: OL27024137M
- Online Computer Library Center (OCLC) ID: 863924204
- All ISBNs: 3322866106 - 9783322866103
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Chipkarten-Systeme erfolgreich realisieren at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Foundations and Practice of Security Lecture Notes in Computer Science
By Pascal Lafourcade

“Foundations and Practice of Security Lecture Notes in Computer Science” Metadata:
- Title: ➤ Foundations and Practice of Security Lecture Notes in Computer Science
- Author: Pascal Lafourcade
- Publisher: Springer
- Publish Date: 2012
“Foundations and Practice of Security Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Computer security - Zugriffskontrolle - RFID - Systèmes informatiques - Computersicherheit - Privatsphäre - Chipkarte - Mesures de sûreté - Chiffrierung - Kryptoanalyse - Rechnernetz - Datensicherung - Formale Methode - Informationssystem - Serviceorientierte Architektur - Congresses - Web Services - Kryptosystem - Kryptologie - Verifikation - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26138614M
- Library of Congress Control Number (LCCN): 2011945035
- All ISBNs: 9783642279003 - 3642279007
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Foundations and Practice of Security Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science
By Michael Tunstall

“Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science” Metadata:
- Title: ➤ Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science
- Author: Michael Tunstall
- Publisher: Springer
- Publish Date: 2010
“Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Computer networks - Computer software - Data protection - Computer science - Access control - Ubiquitous computing - Eingebettetes System - Mobile computing - Smart cards - Computersicherheit - Datensicherung - Chipkarte - Computer systems - Congresses - Kryptoanalyse - Security measures - Smart Device - Ubiquitous Computing - Computers, congresses
Edition Identifiers:
- The Open Library ID: OL26136549M
- Library of Congress Control Number (LCCN): 2010923798
- All ISBNs: 9783642123672 - 3642123678
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Elektronische Ausweisdokumente
By Klaus Schmeh

“Elektronische Ausweisdokumente” Metadata:
- Title: Elektronische Ausweisdokumente
- Author: Klaus Schmeh
- Language: ger
- Number of Pages: Median: 266
- Publisher: Hanser
- Publish Date: 2009
- Publish Location: Mu nchen
“Elektronische Ausweisdokumente” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL25543409M
- Online Computer Library Center (OCLC) ID: 496269188
- All ISBNs: 9783446419186 - 3446419187
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Elektronische Ausweisdokumente at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Information security and cryptology - ICISC 2007
By ICISC 2007 (2007 Seoul, Korea)

“Information security and cryptology - ICISC 2007” Metadata:
- Title: ➤ Information security and cryptology - ICISC 2007
- Author: ICISC 2007 (2007 Seoul, Korea)
- Language: English
- Number of Pages: Median: 366
- Publisher: Springer
- Publish Date: 2007
- Publish Location: New York - Berlin
“Information security and cryptology - ICISC 2007” Subjects and Themes:
- Subjects: ➤ Cryptography - Rechnernetz - Datensicherung - Computersicherheit - Chipkarte - Computer security - Biometrie - Chiffrierung - Congresses - Kryptologie - Kryptoanalyse - Authentifikation - Computational complexity - Data encryption (Computer science) - Computer networks - Information networks - Data protection - Computer software
Edition Identifiers:
- The Open Library ID: OL25336963M
- Online Computer Library Center (OCLC) ID: 182526854
- Library of Congress Control Number (LCCN): 2007939824
- All ISBNs: 9783540767879 - 3540767878
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information security and cryptology - ICISC 2007 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information Security Applications
By Hutchison, David - undifferentiated

“Information Security Applications” Metadata:
- Title: ➤ Information Security Applications
- Author: ➤ Hutchison, David - undifferentiated
- Language: English
- Number of Pages: Median: 334
- Publisher: ➤ Springer-Verlag - Springer Berlin Heidelberg
- Publish Date: 2009
- Publish Location: Berlin, Heidelberg
“Information Security Applications” Subjects and Themes:
- Subjects: ➤ Information Systems - Data encryption (Computer science) - Software engineering - Computer science - Data protection - Computer software - Computer security - Congresses - Chipkarte - Kongress - Datensicherung - Drahtloses Sensorsystem - Computersicherheit - Kryptoanalyse - Kryptosystem - Trusted Computing
Edition Identifiers:
- The Open Library ID: OL25542781M
- Online Computer Library Center (OCLC) ID: 310400683
- Library of Congress Control Number (LCCN): 2009920695
- All ISBNs: 9783642003059 - 9783642003066 - 3642003052 - 3642003060
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.