Books on the topic 'Computer networks Security measures Australia'

To see the other types of publications on this topic, follow the link: Computer networks Security measures Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer networks Security measures Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liqun, Chen, Mu Yi 1955-, and Susilo Willy, eds. Information security practice and experience: 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Officers, Western Australia Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police. Western Australia Police Service: Information management and security. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Western Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Corruption prevention strategies. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Western Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Internal investigations and disciplinary processes. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Any Western Australian Police Officer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

M, González Nieto Juan, ed. Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 proceedings. New York: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Per, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Eric, Cole, ed. Network security fundamentals. Hoboken, N.J: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Network security foundations. San Francisco, Calif: SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Practical computer network security. Boston: Artech House, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Teumim, David J. Industrial network security. 2nd ed. Research Triangle Park, NC: ISA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Network security architectures. Indianapolis, IN: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hossein, Bidgoli, ed. Handbook of information security. Hoboken, NJ: Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Donald, Stoddard, ed. Network security first-step. 2nd ed. Indianapolis, IN: Cisco Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Networking security and standards. Boston, Mass: Kluwer Academic, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Network security first-step. Indianapolis, IN: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Network security auditing. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

J, Cooper Frederic, ed. Implementing Internet security. Indianapolis, Ind: New Riders Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

William, Stallings. Computer security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Computer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Network Security Hacks. Beijing: O'Reilly, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Horton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Samarati, Pierangela, and Joseph K. Liu. Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhou, Wei, Selwyn Piramuthu, and Robin Doss. Future Network Systems and Security: 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mu, Yi, Liqun Chen, and Willy Susilo. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings. Springer London, Limited, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Applications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Warren, Matthew, Gang Li, Lynn Batten, and Wenjia Niu. Applications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Seberry, Jennifer, and Lynn Batten. Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Gang, and Lynn Batten. Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ... in Computer and Information Science). Ingramcontent, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Safavi-Naini, Reihaneh, and Lynn Batten. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

(Editor), Lynn Batten, and Reihaneh Safavi-Naini (Editor), eds. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Lecture Notes in Computer Science). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Gang, and Lynn Batten. Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Brown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Merkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Rak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kizza, Joseph Migga. Computer Network Security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kizza, Joseph Migga. Computer Network Security. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Douligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Beautiful Security. O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Malamud, Carl. Security and Networks. O'Reilly, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Endpoint Security. Addison-Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kadrich, Mark. Endpoint Security. Pearson Education, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kadrich, Mark. Endpoint Security. Addison Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pike, James. Cisco Network Security. Prentice Hall PTR, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Strebe, Matthew. Network Security JumpStart. Sybex, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography