Books on the topic 'Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Find full textMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Find full textTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Find full textHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Full textMacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Full textDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Find full textSoftware security: Building security in. Upper Saddle River, NJ: Addison-Wesley, 2006.
Find full textMukute, Mutizwa, D. Mnyulwa, and Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Find full textJarvis, Lee, and Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Full textBourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Full textHausman, Kalani Kirk. Security+. Indianapolis, Ind: Que, 2003.
Find full textFleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.
Find full textNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Oxford: Pergamon Open Learning, 1991.
Find full textShade, Mike. Security. Round Rock, TX: Torquere Press, 2009.
Find full textJob Corp (U.S.), ed. Security. [Washington, D.C.?]: Job Corps, 1991.
Find full textBelinda, Fairthorne, and ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.
Find full textPublications, Key Note, ed. Security. 5th ed. London: Key Note Publications, 1989.
Find full textNotePublications, Key, ed. Security. 6th ed. Hampton: Key Note Publications, 1990.
Find full text1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Find full textAmidon, Stephen. Security. New York: Farrar, Straus and Giroux, 2009.
Find full textZedner, Lucia. Security. New York, NY: Routledge, 2009.
Find full textOffice, National Preservation. Security. London: National Preservation Office, 1989.
Find full textChartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Find full textEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Find full text1949-, Deighton Anne, Mauer Victor, and Eidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik., eds. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Find full textNoordergraaf, Alex. Securing systems with the Solaris security toolkit. Santa Clara, Calif: Sun Microsystems, 2003.
Find full textDeloitte & Touche. E-commerce security: Securing the network perimeter. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2002.
Find full textMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Find full textWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Find full textLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Find full textCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Full textOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Find full textRamonyai, Jerry. Decision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Find full textVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Find full textHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Find full textRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Find full textGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Find full textVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Find full textSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Find full textPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Find full textBrown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.
Find full textHalleen, Gary, and Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.
Find full textSocial Security, Supplemental Security Income. [S.l: s.n., 2001.
Find full textPramanik, Sabyasachi, Debabrata Samanta, M. Vinay, and Abhijit Guha, eds. Cyber Security and Network Security. Wiley, 2022. http://dx.doi.org/10.1002/9781119812555.
Full textBashevkin, Sylvia. Women’s Security as National Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.003.0006.
Full textPort security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Find full textStewart, Jim. SAP Security: SAP Security Essentials. Equity Press, 2005.
Find full textAgency, International Atomic Energy. Computer Security for Nuclear Security. International Atomic Energy Agency, 2021.
Find full textStaff, Red Dot Publications, and Department Of DEFENSE. Electronic Security Systems: Security Engineering. Independently Published, 2017.
Find full textNewhart, Wilbur. Computer Security Exploits: Web Security. Lulu Press, Inc., 2012.
Find full text