Books on the topic 'Information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Full textLongley, Dennis, Michael Shain, and William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Full textMambo, Masahiro, and Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Full textStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Full textChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui, and Siu Ming Yiu, eds. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Full textChan, Agnes Hui, and Virgil Gligor, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Full textGollmann, Dieter, and Felix C. Freiling, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Full textSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Full textChen, Liqun, Mark Manulis, and Steve Schneider, eds. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Full textZhou, Jianying, Javier Lopez, Robert H. Deng, and Feng Bao, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.
Full textOkamoto, Eiji, George Davida, and Masahiro Mambo, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030404.
Full textStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118027974.
Full textGaray, Juan A., Arjen K. Lenstra, Masahiro Mambo, and René Peralta, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75496-1.
Full textDavida, George I., and Yair Frankel, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45439-x.
Full textNguyen, Phong Q., and Jianying Zhou, eds. Information Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69659-1.
Full textVenter, Hein, Marianne Loock, Marijke Coetzee, Mariki Eloff, and Jan Eloff, eds. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7.
Full textLopez, Javier, and Chris J. Mitchell, eds. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23318-5.
Full textSamarati, Pierangela, Moti Yung, Fabio Martinelli, and Claudio A. Ardagna, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04474-8.
Full textDesmedt, Yvo, ed. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27659-5.
Full textBurmester, Mike, Gene Tsudik, Spyros Magliveras, and Ivana Ilić, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18178-8.
Full textKatsikas, Sokratis K., Javier López, Michael Backes, Stefanos Gritzalis, and Bart Preneel, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11836810.
Full textLin, Zhiqiang, Charalampos Papamanthou, and Michalis Polychronakis, eds. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30215-3.
Full textZhang, Kan, and Yuliang Zheng, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b100936.
Full textBoyd, Colin, and Wenbo Mao, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13828.
Full textWu, Tzong-Chen, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85886-7.
Full textGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen, Josef Pieprzyk, Jennifer Seberry, and Eiji Okamoto, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44456-4.
Full textLai, Xuejia, Jianying Zhou, and Hui Li, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24861-0.
Full textBishop, Matt, and Anderson C. A. Nascimento, eds. Information Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45871-7.
Full textSusilo, Willy, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, and Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22390-7.
Full textUnited States. Marshals Service. Internal Security Division. Information security. Washington, D.C.?]: U.S. Department of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division, 1991.
Find full textStamp, Mark. Information Security. New York: John Wiley & Sons, Ltd., 2005.
Find full textAmerican Institute of Certified Public Accountants., ed. Information security. Jersey City, NJ: American Institute of Certified Public Accountants, 1995.
Find full textBrewer, Michael. Information security. London: DISC, BSi Standards, 1992.
Find full textUnited States. Marshals Service. Internal Security Division, ed. Information security. [Washington, D.C.?]: U.S. Dept. of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division, 1991.
Find full textAthanasopoulos, Elias, and Bart Mennink, eds. Information Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49187-0.
Full textE, Ettinger J., ed. Information security. London: Chapman & Hall, 1993.
Find full textLiedtke, Thomas. Information Security. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-45711-2.
Full textMouha, Nicky, and Nick Nikiforakis, eds. Information Security. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-75764-8.
Full textMouha, Nicky, and Nick Nikiforakis, eds. Information Security. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-75757-0.
Full textDrevin, Lynette, Suné Von Solms, and Marianthi Theocharidou, eds. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.
Full textDrevin, Lynette, and Marianthi Theocharidou, eds. Information Security Education. Education in Proactive Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23451-5.
Full textDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Find full textSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textKim, Hyoungshick, ed. Information Security Applications. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0.
Full textTripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Full textJhanjhi, Noor Zaman, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R. S. Tavares. Information Security Handbook. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228.
Full textSmith, Adam, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32284-6.
Full textDesmedt, Yvo, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10230-1.
Full textKim, Ho-won, and Dooho Choi, eds. Information Security Applications. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2.
Full textKurosawa, Kaoru, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14496-7.
Full text