To see the other types of publications on this topic, follow the link: Security threats.

Books on the topic 'Security threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. London: Routledge, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Threats to U.S. national security. Washington: U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

A, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Insider threats in cyber security. New York: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barnett, Dana, and Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Probst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gaufman, Elizaveta. Security Threats and Public Perception. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Apikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Futter, Andrew, ed. Threats to Euro-Atlantic Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rusdi, Siswanto. Maritime security and its threats. Jakarta: Maritime Security Coordinating Board, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

United Service Institution of India., ed. Internal threats and national security. New Delhi: United Service Institution of India, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Oren, Barak, and Sheffer Gabriel, eds. Existential threats and civil security relations. Lanham, Md: Lexington Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Nossal, Kim Richard, Christian Leuprecht, and Todd Steven Hataley. Evolving transnational threats and border security. Kingston, Ont: Centre for International and Defence Policy, Queen's University, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kuznecova, Natal'ya. Threats to the organization's personnel security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1058832.

Full text
Abstract:
The monograph examines theoretical approaches to the essence of threats to personnel security and assesses their severity. The article examines current trends and approaches in the field of countering threats to the personnel security of organizations. It is intended for teachers, postgraduates and senior students of economic higher educational institutions, specialists in the field of human resources management.
APA, Harvard, Vancouver, ISO, and other styles
20

Human trafficking and future security threats. Lahore: Kitabistan, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Denning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cameron, Debra. Global network security: Threats and countermeasures. Charleston, SC: Computer Technology Research Corp., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Nayak, Padmalaya, Niranjan Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Philippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Summers, Rita C. Secure computing: Threats and safeguards. New York: McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Understanding emerging security challenges: Threats and opportunities. New York, NY: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Threats in the age of Obama. Ann Arbor, Mich: Nimble Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Preble, Christopher A., and John Mueller. A dangerous world?: Threat perception and U.S. national security. Washington, D.C: Cato Institute, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Project, Honeynet, ed. Know your enemy: Learning about security threats. 2nd ed. Boston: Addison-Wesley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Homeland security threats, countermeasures, and privacy issues. Boston: Artech House, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hasseler, Bjorn. Security Threats. 1632, Inc., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hasseler, Bjorn. Security Threats. 1632, Inc., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Thomas, Ciza, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Arduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Arduin, Pierre-Emmanuel, and Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Herd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Understanding New Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gueldry, Michel, Gigi Gokcek, and Lui Hebron, eds. Understanding New Security Threats. Routledge, 2019. http://dx.doi.org/10.4324/9781315102061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mogire, Edward. Victims as Security Threats. Routledge, 2016. http://dx.doi.org/10.4324/9781315548319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Mogire, Edward O. Victims As Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hebron, Lui, Michel Gueldry, and Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

United States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. Washington, D.C: The Bureau, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Politics of Cyber-Security Threats. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Herd, Graeme P., and Anne Aldis. Soft Security Threats and Europe. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gollmann, Dieter, Matt Bishop, Christian W. Probst, and Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Committee on Commerce Science (senate), United States Senate, and United States United States Congress. Emerging Threats to Rail Security. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography