Books on the topic 'Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Find full textMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Find full textTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Find full textJarvis, Lee, and Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Full textBourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Full text1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Find full textOffice, National Preservation. Security. London: National Preservation Office, 1989.
Find full textChartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Find full textFleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.
Find full textNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Oxford: Pergamon Open Learning, 1991.
Find full textShade, Mike. Security. Round Rock, TX: Torquere Press, 2009.
Find full textJob Corp (U.S.), ed. Security. [Washington, D.C.?]: Job Corps, 1991.
Find full textBelinda, Fairthorne, and ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.
Find full textPublications, Key Note, ed. Security. 5th ed. London: Key Note Publications, 1989.
Find full textNotePublications, Key, ed. Security. 6th ed. Hampton: Key Note Publications, 1990.
Find full textZedner, Lucia. Security. New York, NY: Routledge, 2009.
Find full textHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Full textMacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Full textDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Find full textMukute, Mutizwa, D. Mnyulwa, and Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Find full text1949-, Hawkes Kenneth Gale, and United States. Dept. of Transportation, eds. Port security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Find full textEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Find full textMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Find full textWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Find full textLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Find full textCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Full textOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Find full textDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Find full textVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Find full textHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Find full textVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Find full textRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Find full textGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Find full textSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Find full textPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Find full textPublishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.
Find full textM, Ernest. Security. Independently Published, 2019.
Find full textZedner, Lucia. Security. Routledge, 2009. http://dx.doi.org/10.4324/9780203871133.
Full textWilliams, Jonathan. Security. PublishAmerica, 2009.
Find full textSecurity. 7th ed. Hampton: Key Note Publications, 1991.
Find full textSecurity. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009270113.
Full textSecurity+. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-153-2.x5000-2.
Full textPurpura, Philip P. Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781439894569.
Full textBaggot, Mandy. Security. Sapphire Star Publishing LLC, 2013.
Find full textAnderson, Poul. Security. Aegypan, 2007.
Find full textSecurity. Published for the National Examining Board for Supervisory Management by Pergamon Open Learning, 1990.
Find full textAnderson, Poul. Security. CreateSpace Independent Publishing Platform, 2016.
Find full textKrause, Keith, and Michael Williams. Security. Cambridge University Press, 2002.
Find full textNowlan, James. Security. ULA Press, 2007.
Find full textAnderson, Poul. Security. Start Publishing LLC, 2014.
Find full text