Books on the topic 'Security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
M, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Find full textHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Find full textHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Find full textInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Find full textMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Find full textAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Find full textEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Find full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Find full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Find full textMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Find full textSarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Full textMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
Find full textDiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Find full textTsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Full textStuart, McClure, and Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2nd ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Find full textDiamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Find full textMishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Full textRetail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
Find full textPC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
Find full textDiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Find full textBailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Find full textAbhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Find full textHatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Find full textTransportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Find full textWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.
Find full textTursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Find full textDas, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
Full textJoel, Scambray, and Kurtz George, eds. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
Find full textWorld Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
Find full textJoel, Scambray, and Kurtz George, eds. Hacking exposed: Network security secrets and solutions. 3rd ed. New York: Osborne/McGraw-Hill, 2001.
Find full textTran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Find full text1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Find full textHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Find full textHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Find full textHelton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textJava Security Solutions. Wiley, 2002.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Find full textMueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Find full textMueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Find full textMueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Find full textJournals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.
Find full text