Login / Signup
TK-Datenschutz im Unternehmen (Teil 2).
Joachim Rieß
Published in:
Datenschutz und Datensicherheit (2001)
Keyphrases
</>
event driven
command line
real world
scripting language
databases
case study
object oriented
data model
database systems
decision support system
data processing
wireless networks
xml documents
decision support
intelligent agents
graphical interface