Books on the topic 'Computer networks Security measures Australia'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks Security measures Australia.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Find full textLiqun, Chen, Mu Yi 1955-, and Susilo Willy, eds. Information security practice and experience: 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings. Berlin: Springer, 2008.
Find full textOfficers, Western Australia Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police. Western Australia Police Service: Information management and security. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.
Find full textWestern Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Corruption prevention strategies. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.
Find full textWestern Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Internal investigations and disciplinary processes. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Any Western Australian Police Officer, 2003.
Find full textM, González Nieto Juan, ed. Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 proceedings. New York: Springer, 2009.
Find full textComputer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Find full textOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Find full textPer, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.
Find full textJohn, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.
Find full textEric, Cole, ed. Network security fundamentals. Hoboken, N.J: Wiley, 2008.
Find full textNetwork security foundations. San Francisco, Calif: SYBEX, 2004.
Find full textPractical computer network security. Boston: Artech House, 1995.
Find full textTeumim, David J. Industrial network security. 2nd ed. Research Triangle Park, NC: ISA, 2010.
Find full textNetwork security architectures. Indianapolis, IN: Cisco Press, 2004.
Find full textHossein, Bidgoli, ed. Handbook of information security. Hoboken, NJ: Wiley, 2005.
Find full textDonald, Stoddard, ed. Network security first-step. 2nd ed. Indianapolis, IN: Cisco Press, 2012.
Find full textNetworking security and standards. Boston, Mass: Kluwer Academic, 1997.
Find full textNetwork security first-step. Indianapolis, IN: Cisco Press, 2004.
Find full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textNetwork security auditing. Indianapolis, Ind: Cisco Press, 2010.
Find full textJ, Cooper Frederic, ed. Implementing Internet security. Indianapolis, Ind: New Riders Pub., 1995.
Find full textWilliam, Stallings. Computer security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, 2008.
Find full textComputer security fundamentals. Upper Saddle River, N.J: Pearson Prentice Hall, 2006.
Find full textR, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Find full textNetwork Security Hacks. Beijing: O'Reilly, 2004.
Find full textHorton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.
Find full textSamarati, Pierangela, and Joseph K. Liu. Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings. Springer, 2017.
Find full textZhou, Wei, Selwyn Piramuthu, and Robin Doss. Future Network Systems and Security: 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedings. Springer, 2019.
Find full textMu, Yi, Liqun Chen, and Willy Susilo. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings. Springer London, Limited, 2008.
Find full textApplications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings. Springer, 2014.
Find full textWarren, Matthew, Gang Li, Lynn Batten, and Wenjia Niu. Applications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings. Springer London, Limited, 2014.
Find full textSeberry, Jennifer, and Lynn Batten. Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings. Springer London, Limited, 2003.
Find full textLi, Gang, and Lynn Batten. Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ... in Computer and Information Science). Ingramcontent, 2016.
Find full textSafavi-Naini, Reihaneh, and Lynn Batten. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Springer London, Limited, 2006.
Find full text(Editor), Lynn Batten, and Reihaneh Safavi-Naini (Editor), eds. Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (Lecture Notes in Computer Science). Springer, 2006.
Find full textLi, Gang, and Lynn Batten. Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Springer, 2016.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textKizza, Joseph Migga. Computer Network Security. Springer, 2010.
Find full textKizza, Joseph Migga. Computer Network Security. Springer, 2005.
Find full textDouligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.
Find full textBeautiful Security. O'Reilly Media, Inc., 2008.
Find full textMalamud, Carl. Security and Networks. O'Reilly, 1993.
Find full textEndpoint Security. Addison-Wesley Professional, 2007.
Find full textKadrich, Mark. Endpoint Security. Pearson Education, Limited, 2021.
Find full textKadrich, Mark. Endpoint Security. Addison Wesley Professional, 2007.
Find full textPike, James. Cisco Network Security. Prentice Hall PTR, 2001.
Find full textStrebe, Matthew. Network Security JumpStart. Sybex, 2002.
Find full text