Books on the topic 'Security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Hruska, Jan. Computer security solutions. Boca Raton: CRC Press, 1990.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Ramachandran, Jay. Designing security architecture solutions. New York: John Wiley, 2002.
Mueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Bücker, Axel. Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Mason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
McClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
DiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Tsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Scambray, Joel. Hacking exposed: Network security secrets & solutions. 2nd ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Diamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Mishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Greggo, Alan. Retail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
DiNicolo, Dan. PC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
DiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Bailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Abhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Hatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Sweet, Kathleen M. Transportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Cache, Johnny. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.
Tursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Das, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
McClure, Stuart. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
World Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
McClure, Stuart. Hacking exposed: Network security secrets and solutions. 3rd ed. New York: Osborne/McGraw-Hill, 2001.
Tran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Doorn, Jorge H. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley, 2002.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Mueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Mueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Mueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Enterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Enterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Journals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.