Books on the topic 'Security'

To see the other types of publications on this topic, follow the link: Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

MacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

MacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Defense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Software security: Building security in. Upper Saddle River, NJ: Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mukute, Mutizwa, D. Mnyulwa, and Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jarvis, Lee, and Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hausman, Kalani Kirk. Security+. Indianapolis, Ind: Que, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

National Examining Board for Supervisory Management., ed. Security. 2nd ed. Oxford: Pergamon Open Learning, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shade, Mike. Security. Round Rock, TX: Torquere Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Job Corp (U.S.), ed. Security. [Washington, D.C.?]: Job Corps, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Belinda, Fairthorne, and ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Publications, Key Note, ed. Security. 5th ed. London: Key Note Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

NotePublications, Key, ed. Security. 6th ed. Hampton: Key Note Publications, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Amidon, Stephen. Security. New York: Farrar, Straus and Giroux, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zedner, Lucia. Security. New York, NY: Routledge, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Office, National Preservation. Security. London: National Preservation Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Eidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

1949-, Deighton Anne, Mauer Victor, and Eidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik., eds. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Noordergraaf, Alex. Securing systems with the Solaris security toolkit. Santa Clara, Calif: Sun Microsystems, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Deloitte & Touche. E-commerce security: Securing the network perimeter. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Weiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Laird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.

Full text
Abstract:
The twentieth century was marked by the proliferation of security regimes, and collective security in particular. Under a collective security arrangement, all states at either a regional or global level agree to resolve their disputes peacefully, collectively oppose acts of aggression, and actively defend those who are victims of such aggression. It is based on the premise that security is indivisible, that is, each state’s security is intricately tied to the security of others, and no nation can be completely secure so long as the territory, independence, and populations of other states are seriously threatened. However, over the past several decades, ethnic conflicts, civil wars, guerrilla insurgencies, and other forms of internal violence have dramatically increased, even as large-scale interstate wars have declined. In addition to these sources of instability and conflict, political repression and extreme human rights abuses by governments against their populations (particularly genocide and ethnic cleansing) often generate massive refugee flows, illegal arms trafficking, and the rise of paramilitary guerrilla armies, all of which could disrupt neighboring states and regional stability. Thus, the concept of security adopted by international and regional regimes over the past few decades has expanded from the threat and use of force for deterrence and enforcement to include nation- and state-building, peacekeeping, and peace-making.
APA, Harvard, Vancouver, ISO, and other styles
32

Operations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ramonyai, Jerry. Decision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Vehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Raam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Guan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Vehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Publishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Brown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Halleen, Gary, and Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Social Security, Supplemental Security Income. [S.l: s.n., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pramanik, Sabyasachi, Debabrata Samanta, M. Vinay, and Abhijit Guha, eds. Cyber Security and Network Security. Wiley, 2022. http://dx.doi.org/10.1002/9781119812555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bashevkin, Sylvia. Women’s Security as National Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.003.0006.

Full text
Abstract:
Chapter 6 evaluates the trajectory of Hillary Rodham Clinton from the roles of first lady, senator, and presidential candidate to secretary of state. Similar to Albright’s actions in the Balkans, Clinton endorsed NATO intervention in Libya in 2011. Military action in North Africa formed a crucial element of President Barack Obama’s first-term foreign policy record. It paralleled Clinton’s support as a senator for the US invasion of Iraq. Efforts by Clinton to make women’s rights a major pivot of her international doctrine echoed the feminist perspectives she held since early adulthood, which in turn were integral to the Democratic Party support base of the 1970s and following.
APA, Harvard, Vancouver, ISO, and other styles
46

Port security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Stewart, Jim. SAP Security: SAP Security Essentials. Equity Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Agency, International Atomic Energy. Computer Security for Nuclear Security. International Atomic Energy Agency, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Staff, Red Dot Publications, and Department Of DEFENSE. Electronic Security Systems: Security Engineering. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Newhart, Wilbur. Computer Security Exploits: Web Security. Lulu Press, Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography