Books on the topic 'Computer networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
John, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.
Find full textTeumim, David J. Industrial network security. 2nd ed. Research Triangle Park, NC: ISA, 2010.
Find full textOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Find full textHunt, Craig. Network Security. Sebastopol, CA: O’Reilly Media, 1998.
Find full textBhatnagar, Kartik. Cisco security. Cincinnati, Ohio: Premier Press, 2002.
Find full textHorton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.
Find full textR, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Find full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.
Find full textChristmas, Paul. Network security manager. Oxford, England: Elsevier Advanced Technology, 1992.
Find full textBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Find full textMalamud, Carl. Security and Networks. O'Reilly, 1993.
Find full textRak, Jacek, Krzysztof Szczypiorski, Igor Kotenko, John Bay, Leonard Popyack, and Victor Skormin. Computer Network Security. Springer, 2017.
Find full textKizza, Joseph Migga. Computer Network Security. Springer, 2010.
Find full textKizza, Joseph Migga. Computer Network Security. Springer, 2005.
Find full textMerkow, Mark S., and Jim Breithaupt. Computer Security Assurance. Cengage Delmar Learning, 2004.
Find full textComputer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Find full textDouligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.
Find full textKanneganti, Ramarao, and Prasad Chodavarapu. SOA Security. Manning Publications Co. LLC, 2007.
Find full textComputer Network Security. Springer, 2005.
Find full textPike, James. Cisco Network Security. Prentice Hall PTR, 2001.
Find full textStrebe, Matthew. Network Security Jumpstart. Wiley & Sons, Incorporated, John, 2006.
Find full textAlbanese, Jason, and Wes Sonnenreich. Network Security Illustrated. McGraw-Hill Professional, 2003.
Find full textStrebe, Matthew. Network Security JumpStart. Sybex, 2002.
Find full textZero Trust Networks. O'Reilly Media, 2024.
Find full textKizza, Joseph Migga. Guide to Computer Network Security. Springer, 2009.
Find full textKizza, Joseph Migga. Guide to Computer Network Security. Springer, 2018.
Find full textKizza, Joseph Migga. Guide to Computer Network Security. Springer, 2017.
Find full textKizza, Joseph Migga. Guide to Computer Network Security. Springer International Publishing AG, 2020.
Find full textConvery, Sean. Network Security Architectures. Pearson Education, Limited, 2004.
Find full textTeumim, David J. Industrial Network Security. ISA-The Instrumentation, Systems, and Automation Society, 2004.
Find full textConvery, Sean. Network Security Architectures. Cisco Press, 2004.
Find full textNetwork Security Architectures. Cisco Press, 2004.
Find full textNetwork security architectures. Indianapolis, IN: Cisco Press, 2004.
Find full textSchudel, Gregg, and Smith David. Router Security Strategies: Securing IP Network Traffic Planes. Pearson Education, Limited, 2007.
Find full textSOA Security. Manning Publications, 2008.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Jiri Kuthan, and Ulrich Abend. SIP Security. Wiley & Sons, Limited, John, 2009.
Find full textSchulzrinne, Henning, Dorgham Sisalem, John Floroiu, Ulrich Abend, and Jirí Kuthan. Sip Security. Wiley & Sons, Incorporated, John, 2009.
Find full textHalleen, Gary, and Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.
Find full textEasttom, William (Chuck) II. Computer Security Fundamentals. Pearson Education, Limited, 2013.
Find full textEasttom, Chuck. Computer Security Fundamentals. Pearson Education, Limited, 2021.
Find full textEasttom, Chuck. Computer Security Fundamentals. Pearson Education, Limited, 2021.
Find full textII, William (Chuck) Easttom. Computer Security Fundamentals. Pearson Education, Limited, 2019.
Find full textII, Easttom William (Chuck). Computer Security Fundamentals. Pearson Education, Limited, 2018.
Find full textKadrich, Mark. Endpoint Security. Pearson Education, Limited, 2021.
Find full textKadrich, Mark. Endpoint Security. Addison Wesley Professional, 2007.
Find full textLockhart, Andrew. Network Security Hacks. O'Reilly Media, Incorporated, 2006.
Find full textLockhart, Andrew. Network Security Hacks. O'Reilly Media, Incorporated, 2006.
Find full textKizza, Joseph Migga Migga. Guide to Computer Network Security. Springer, 2010.
Find full textEncinas, Luis Hernandez, Kevin Daimi, Guillermo Francia, Levent Ertaul, and Eman El-Sheikh. Computer and Network Security Essentials. Springer, 2018.
Find full text