Books on the topic 'Security orchestration and automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security orchestration and automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.
Full textBryan, Singer, ed. Industrial automation and process control security. Boca Raton: CRC Press, 2012.
Find full textKrutz, Ronald L. Industrial automation and control system security principles. Research Triangle Park, NC: International Society of Automation (ISA), 2013.
Find full textSoper, Mark Edward. Absolute beginner's guide to home automation. Indianapolis, Ind: Que, 2005.
Find full textUnited States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textGirardin, Pierre. La domotique. Sainte-Foy, Québec: Société d'habitation du Québec, 1994.
Find full textHuman behavior recognition technologies: Intelligent applications for monitoring and security. Hershey, PA: Information Science Reference, 2013.
Find full textBusiness data communications: Basic concepts, security and design. 4th ed. New York: Wiley, 1993.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 2nd ed. New York: Wiley, 1988.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security and design. 3rd ed. New York: Wiley, 1990.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security and design. 2nd ed. Chichester: Wiley, 1988.
Find full textComputer audit, control, and security. New York: Wiley, 1989.
Find full textGarfinkel, Simson. RFID: Applications, security, and privacy. Upper Saddle River, NJ: Addison-Wesley, 2006.
Find full textOffice, General Accounting. Electronic banking: Experiences reported by banks in implementing on-line banking : report to the Chairman, Committee on Banking and Financial Services, House of Representatives. Washington, D.C: The Office, 1998.
Find full textKrzysztof, Iniewski, ed. Smart grid: Applications, communications, and security. Hoboken, N.J: Wiley, 2012.
Find full textSecurity, audit and control features: SAP ERP. 3rd ed. Rolling Meadows, IL: ISACA, 2009.
Find full textEric, Faulkner, ed. Home hacking projects for geeks. Sebastopol, CA: O'Reilly Media, 2004.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 4th ed. New York: Wiley, 1993.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 3rd ed. New York: Wiley, 1990.
Find full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). [Washington, D.C.?: U.S. G.P.O., 1995.
Find full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). [Washington, D.C.?: U.S. G.P.O., 1995.
Find full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). [Washington, D.C.?: U.S. G.P.O., 1995.
Find full textGanapathi, Geetha, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, and Periakaruppan Ramanathan, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0716-4.
Full textBalusamy, Suresh, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, and B. Malar, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8.
Full textHoffmann, Mario. Willenserklärungen im Internet: Rechtssicherheit durch elektronische Signaturen sowie Anpassung der Formvorschriften und des Beweisrechts. Hamburg: Dr. Kovač, 2003.
Find full textBaranov, A. K. Informat͡s︡ionno-vychislitelʹnye seti organov vnutrennikh del: Uchebnoe posobie. Moskva: Akademii͡a︡ MVD RF, 1994.
Find full textSifflard, James A. Conforming your conveyancing practice to the new data security laws & regulations. [Boston, MA]: MCLE, 2010.
Find full textOffice, General Accounting. Information technology management: Social Security Administration practices can be improved : report to the Chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. Washington, D.C: GAO, 2001.
Find full textJames, Essinger, and Pearson Professional Ltd, eds. Banking technology as a competitive weapon 1997: Winning strategies explained. 3rd ed. London: Pearson Professional Ltd, 1996.
Find full textEssinger, James. Banking technology as a competitive weapon. London: FT FinancialPub., 1994.
Find full textMünchen, Universität der Bundeswehr. Verteilte intelligente Mikrosysteme für den privaten Lebensbereich: VIMP : Verbundprojekt im Rahmen des BMBF-Forderungsschwerpunkts Mikrosystemtechnik : Abschlussseminar. Neubiberg bei München: Univ. der Bundeswehr München, 1999.
Find full textJ, Velte Toby, ed. Build your own smart home. New York: McGraw-Hill/Osborne, 2003.
Find full textSandage, Tim, and Ted Steffan. AWS Security Automation and Orchestration: Modernizing Governance Through Security Design. O'Reilly Media, Incorporated, 2019.
Find full textSecurity Automation Essentials. McGraw-Hill/Osborne Media, 2012.
Find full textSecurity Orchestration for Dummies, Demisto Special Edition (Custom). Wiley & Sons, Incorporated, John, 2019.
Find full textIyer, Abhishek. Security Orchestration for Dummies, Demisto Special Edition (Custom). Wiley & Sons, Incorporated, John, 2019.
Find full textOrchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT. Cisco Press, 2018.
Find full textSabella, Anthony, Rik Irons-Mclean, and Marcelo Yannuzzi. Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT. Pearson Education, Limited, 2018.
Find full textSabella, Anthony, Rik Irons-Mclean, and Marcelo Yannuzzi. Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT. Pearson Education, Limited, 2018.
Find full textRuecker, Bernd. Practical Process Automation: Orchestration and Integration in Microservices and Cloud Native Architectures. O'Reilly Media, 2021.
Find full textNeittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2015.
Find full textCyber Security: Analytics, Technology and Automation. Springer, 2015.
Find full textNeittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2016.
Find full textKeating, Jesse. Mastering Ansible: Design, Develop, and Solve Real World Automation and Orchestration Needs by Unlocking the Automation Capabilities of Ansible. Packt Publishing, Limited, 2015.
Find full textSoftware for Automation: Architecture, Integration, and Security. ISA-The Instrumentation, Systems, and Automation Society, 2005.
Find full textIndustrial Automation and Control System Security Principles. ISA, 2016.
Find full textStrong Security Governance Through Integration and Automation. Taylor & Francis Group, 2021.
Find full text