Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Fachgebiete(RVK)
  • 1
    Buch
    Buch
    Chichester :Wiley,
    UID:
    almahu_BV035333114
    Umfang: XXIII, 257 S. : , graph. Darst.
    ISBN: 978-0-470-02748-6
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Ad-hoc-Netz ; Computersicherheit ; Drahtloses Sensorsystem ; Computersicherheit
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Hoboken, N.J. :Wiley ;
    UID:
    edocfu_9959327350902883
    Umfang: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Inhalt: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Anmerkung: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Weitere Ausg.: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Weitere Ausg.: ISBN 0470027487
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic resource.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Hoboken, N.J. :Wiley ;
    UID:
    almahu_9948197272402882
    Umfang: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Inhalt: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Anmerkung: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Weitere Ausg.: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Weitere Ausg.: ISBN 0470027487
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic resource.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Chichester, U.K. :Wiley,
    UID:
    edocfu_9961556760502883
    Umfang: 1 online resource (283 p.)
    Ausgabe: 1st edition
    ISBN: 1-282-68998-3 , 9786612689987 , 0-470-51678-X , 0-470-51677-1
    Inhalt: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Anmerkung: Description based upon print version of record. , About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks. , 10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. , Also available in print. , English
    Weitere Ausg.: ISBN 0-470-02748-7
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Hoboken, N.J. :Wiley ;
    UID:
    almafu_9959327350902883
    Umfang: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Inhalt: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Anmerkung: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Weitere Ausg.: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Weitere Ausg.: ISBN 0470027487
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic resource.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780470022986?
Meinten Sie 9780470023686?
Meinten Sie 9780470020586?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz