Books on the topic 'Computer security Australia Case studies'

To see the other types of publications on this topic, follow the link: Computer security Australia Case studies.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer security Australia Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Case studies in secure computing: Achievements and trends. Boca Raton: CRC Press/Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Auditing computer security: A manual with case studies. New York: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

CyberForensics: Understanding information security investigations. New York: Humana Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

S, Kakalik John, ed. Information security: Contemporary cases. Boston: Jones and Bartlett, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wells, Joseph T. Internet fraud casebook: The World Wide Web of deceit. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Case Studies in Information Warfare and Security: For Researchers, Teachers and Students. Academic Conferences and Publishing International Limited: United Kingdom, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Struggling for self reliance: Four case studies of Australian regional force projection in the late 1980s and the 1990s. Canberra: ANU E Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lüthi, Martin. Information system security in health information systems: Exploratory research in US and Swiss acute-care hospitals. Lohmar: Eul, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Essinger, James. Controlling computer security: A guide for financial institutions. London: Financial Times Business Information, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

People get screwed all the time: Protecting yourself from scams, fraud, identity theft, fine print, and more. New York: Collins, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

C, Mann Charles, ed. At large: The strange case of the world's biggest Internet invasion. New York, NY: Simon & Schuster, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Technological turf wars: A case study of the antivirus industry. Philadelphia PA: Temple University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dissecting the hack: The forb1dd3n network. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Case studies in intelligent computing: Achievements and trends. Boca Raton: CRC Press, Taylor & Francis Group, CRC Press is an imprint of the Taylor & Francis Group, an informa business, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Street, Jayson E. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kent, Nabors, ed. Dissecting the hack: The f0rb1dd3n network. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

The securitization of humanitarian migration: Digging moats and sinking boats. Milton Park, Abingdon, Oxon: Routledge, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Stuttgart, Birgit Brandau/agens Redaktionsservice, ed. Data Zone: Die Hackerjagd im Internet. Nördlingen, Germany: Deutscher Taschenbuch Verlag GmbH & Co. KG, München, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

John, Markoff, ed. Take-down: The pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw--by the man who did it. New York: Hyperion, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shimomura, Tsutomu. Takedown: The pursuit and capture of Kevin Mitnick, America's most notorious cybercriminal - by the man who did it. London: Secker & Warburg, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kadri, Kaska, and Vihul Liis, eds. International cyber incidents: Legal considerations. Tallinn, Estonia: Cooperative Cyber Defence of Excellence (CCD COE), 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Moroney, Jennifer D. P. Lessons from U.S. allies in security cooperation with third countries: The cases of Australia, France, and the United Kingdom. Santa Monica, CA: RAND, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mattord, Herbert J. Readings and Cases in Information Security: Law and Ethics. Boston, MA: Course Technology Cengage Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mobile malware attacks and defense. Burlington, MA: Elsevier, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Alkier, Lore. Zukunftsweisende Konzepte für die EDV-Ausbildung: Dargestellt am Beispiel der strategischen EDV-Ausbildungsplanung der Wirtschaftsuniversität Wien. Heidelberg: Physica-Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

(Organization), WikiLeaks, ed. The passion of Bradley Manning: [the story of the suspect behind the largest security breach in U.S. history]. New York: OR Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Anastasi, Joe. The New Forensics. New York: John Wiley & Sons, Ltd., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Office, General Accounting. Electronic government: Better information needed on agencies' implementation of the Government Paperwork Elimination Act : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Office, General Accounting. Electronic government: Government Paperwork Elimination Act presents challenges for agencies : report to the ranking minority member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Office, General Accounting. Electronic government: Planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Office, General Accounting. Electronic government: Selection and implementation of the Office of Management and Budget's 24 initiatives : report to the Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Office, General Accounting. Electronic government: Progress in promoting adoption of smart card technology : report to the chairman, Subcommittee on Technology and Procurement Policy, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Office, General Accounting. Electronic government: Progress in promoting adoption of smart card technology : report to the chairman, Subcommittee on Technology and Procurement Policy, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Office, General Accounting. Electronic government: Challenges to effective adoption of the Extensible Markup Language : report to the chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Issac, Biju, and Nauman Israr. Case Studies in Secure Computing: Achievements and Trends. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Issac, Biju, and Nauman Israr. Case Studies in Secure Computing: Achievements and Trends. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Issac, Biju, and Nauman Israr. Case Studies in Secure Computing: Achievements and Trends. Auerbach Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Issac, Biju, and Nauman Israr. Case Studies in Secure Computing: Achievements and Trends. Auerbach Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Security Assessment: Case Studies for Implementing the NSA IAM. Syngress, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Chong, and Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Chong, and Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Chong, and Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Chong, and Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Chong, and Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Nanda, Manju, and Yogananda Jeppu. Formal Methods for Safety and Security: Case Studies for Aerospace Applications. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Formal Methods for Safety and Security: Case Studies for Aerospace Applications. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Klein, Gunnar O. Case Studies of Security Problems and their Solutions (Studies in Health Technology and Informatics, V. 75). Ios Pr Inc, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography