Books on the topic 'Security solutions'

To see the other types of publications on this topic, follow the link: Security solutions.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Hruska, Jan. Computer security solutions. Boca Raton: CRC Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ramachandran, Jay. Designing security architecture solutions. New York: John Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bücker, Axel. Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

McClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

DiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Scambray, Joel. Hacking exposed: Network security secrets & solutions. 2nd ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Diamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Greggo, Alan. Retail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

DiNicolo, Dan. PC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

DiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Abhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sweet, Kathleen M. Transportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cache, Johnny. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Tursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Das, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

McClure, Stuart. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

World Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

McClure, Stuart. Hacking exposed: Network security secrets and solutions. 3rd ed. New York: Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Doorn, Jorge H. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mueller, John Paul. .NET Development Security Solutions. Sybex, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Enterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Enterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Journals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography