Books on the topic 'Security threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. London: Routledge, 2005.
Find full textBhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Find full textThreats to U.S. national security. Washington: U.S. G.P.O., 1997.
Find full textOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Find full textA, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Find full textInsider threats in cyber security. New York: Springer, 2010.
Find full textComputer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Find full textBarnett, Dana, and Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textJones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Full textGaufman, Elizaveta. Security Threats and Public Perception. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Full textApikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Full textFutter, Andrew, ed. Threats to Euro-Atlantic Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Full textRusdi, Siswanto. Maritime security and its threats. Jakarta: Maritime Security Coordinating Board, 2012.
Find full textUnited Service Institution of India., ed. Internal threats and national security. New Delhi: United Service Institution of India, 1986.
Find full textOren, Barak, and Sheffer Gabriel, eds. Existential threats and civil security relations. Lanham, Md: Lexington Books, 2009.
Find full textNossal, Kim Richard, Christian Leuprecht, and Todd Steven Hataley. Evolving transnational threats and border security. Kingston, Ont: Centre for International and Defence Policy, Queen's University, 2011.
Find full textDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full textKuznecova, Natal'ya. Threats to the organization's personnel security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1058832.
Full textHuman trafficking and future security threats. Lahore: Kitabistan, 2006.
Find full textDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textCameron, Debra. Global network security: Threats and countermeasures. Charleston, SC: Computer Technology Research Corp., 2000.
Find full textNayak, Padmalaya, Niranjan Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Full textPhilippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textSummers, Rita C. Secure computing: Threats and safeguards. New York: McGraw-Hill, 1997.
Find full textUnderstanding emerging security challenges: Threats and opportunities. New York, NY: Routledge, 2012.
Find full textThreats in the age of Obama. Ann Arbor, Mich: Nimble Books, 2009.
Find full textPreble, Christopher A., and John Mueller. A dangerous world?: Threat perception and U.S. national security. Washington, D.C: Cato Institute, 2014.
Find full textProject, Honeynet, ed. Know your enemy: Learning about security threats. 2nd ed. Boston: Addison-Wesley, 2004.
Find full textHomeland security threats, countermeasures, and privacy issues. Boston: Artech House, 2011.
Find full textHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Find full textHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Find full textThomas, Ciza, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.
Full textArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textArduin, Pierre-Emmanuel, and Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textHerd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.
Find full textHebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Find full textUnderstanding New Security Threats. Taylor & Francis Group, 2019.
Find full textGueldry, Michel, Gigi Gokcek, and Lui Hebron, eds. Understanding New Security Threats. Routledge, 2019. http://dx.doi.org/10.4324/9781315102061.
Full textMogire, Edward. Victims as Security Threats. Routledge, 2016. http://dx.doi.org/10.4324/9781315548319.
Full textMogire, Edward O. Victims As Security Threats. Taylor & Francis Group, 2019.
Find full textHebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Find full textHebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Find full textUnited States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. Washington, D.C: The Bureau, 1987.
Find full textPolitics of Cyber-Security Threats. Taylor & Francis Group, 2019.
Find full textHerd, Graeme P., and Anne Aldis. Soft Security Threats and Europe. Taylor & Francis Group, 2014.
Find full textGollmann, Dieter, Matt Bishop, Christian W. Probst, and Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.
Find full textCommittee on Commerce Science (senate), United States Senate, and United States United States Congress. Emerging Threats to Rail Security. Independently Published, 2019.
Find full text