(2008). Hardware-based computer security techniques to defeat hackers: From biometrics to quantum cryptography. Wiley.
Chicago-Zitierstil (17. Ausg.)Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Hoboken, N.J: Wiley, 2008.
MLA-Zitierstil (9. Ausg.)Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Wiley, 2008.
Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.