Books on the topic 'System and network security'

To see the other types of publications on this topic, follow the link: System and network security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'System and network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Vacca, John R. Network and system security. Burlington, MA: Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Network and system security. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Min, Chao Chen, and Yang Liu, eds. Network and System Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92708-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Joseph K., and Xinyi Huang, eds. Network and System Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qiu, Meikang, Shouhuai Xu, Moti Yung, and Haibo Zhang, eds. Network and System Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Zheng, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola, eds. Network and System Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jiageng, Vincenzo Piuri, Chunhua Su, and Moti Yung, eds. Network and System Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kutyłowski, Mirosław, Jun Zhang, and Chao Chen, eds. Network and System Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Li, Elisa Bertino, and Yi Mu, eds. Network and System Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Au, Man Ho, Barbara Carminati, and C. C. Jay Kuo, eds. Network and System Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Au, Man Ho, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, and Kamil Kluczniak, eds. Network and System Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lopez, Javier, Xinyi Huang, and Ravi Sandhu, eds. Network and System Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38631-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yuan, Xingliang, Guangdong Bai, Cristina Alcaraz, and Suryadipta Majumdar, eds. Network and System Security. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

A, Fisch Eric, and Pooch Udo W. 1944-, eds. Computer system and network security. Boca Raton: CRC Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

The CERT guide to system and network security practices. Boston: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Broadband network & device security. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Doss, Robin, Selwyn Piramuthu, and Wei Zhou, eds. Future Network Systems and Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94421-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Doss, Robin, Selwyn Piramuthu, and Wei Zhou, eds. Future Network Systems and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65548-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Doss, Robin, Selwyn Piramuthu, and Wei Zhou, eds. Future Network Systems and Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48021-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Doss, Robin, Selwyn Piramuthu, and Wei Zhou, eds. Future Network Systems and Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34353-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Doss, Robin, Selwyn Piramuthu, and Wei ZHOU, eds. Future Network Systems and Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19210-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Quan-Lin, Jinting Wang, and Hai-Bo Yu, eds. Stochastic Models in Reliability, Network Security and System Safety. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0864-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kimmins, John. Telecommunications security guidelines for telecommunications management network. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kimmins, John. Telecommunications security guidelines for telecommunications management network. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

International Conference on Data Management (2nd 2009 Ghaziabad, India). Advances in communication network & security. Edited by Garg Poonam, Ranjan Jayanthi, Chaudhari Narendra S, Gupta Madan M, and Institute of Management Technology (Ghāziabād, India). New Delhi: Macmillan Publishers India, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

service), SpringerLink (Online, ed. Guide to Computer Network Security. 2nd ed. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Patrick, Boch. SAP system security. Bonn: Rheinwerk Publishing, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Principles of secure network systems design. New York: Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Philippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wireless network security: A beginner's guide. New York: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Russell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

1956-, Gong Guang, ed. Communication system security. Boca Raton, FL: Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

1968-, Ellis Scott, ed. Firewalls: Jumpstart for network and systems administrators. Amsterdam: Elsevier Digital, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

De Decker, Bart, Frank Piessens, Jan Smits, and Els Van Herreweghen, eds. Advances in Network and Distributed Systems Security. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/b115767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

CDMA cellular mobile communications & network security. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Industrial network security: Securing critical infrastructure networks for Smart Grid, SCADA , and other industrial control systems. Waltham, MA: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lopez, Javier, Xinyi Huang, and Ravi Sandhu. Network and System Security. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Network and System Security. Syngress, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Network and System Security. Elsevier, 2014. http://dx.doi.org/10.1016/c2011-0-08779-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Vacca, John R. Network and System Security. Elsevier Science & Technology Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vacca, John R. Network and System Security. Elsevier Science & Technology Books, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Abrams, M. Advanced Network & Open System Security. Computer Educators, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Fisch, Eric A., Gregory B. White, and Udo W. Pooch. Computer System and Network Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Fisch, Eric A., Gregory B. White, and Udo W. Pooch. Computer System and Network Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Fisch, Eric A., Gregory B. White, and Udo W. Pooch. Computer System and Network Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer System and Network Security. Edited by Gregory B. White, Eric A. Fisch, and Udo W. Pooch. CRC Press, 2017. http://dx.doi.org/10.1201/9781315140063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Fisch, Eric A., Gregory B. White, and Udo W. Pooch. Computer System and Network Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sweeney, Michael. Network Security Using Linux. Lulu.com, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sweeney, Michael. Network Security Using Linux. Lulu.com, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tung, Brian. Kerberos: A Network Authentication System. Addison-Wesley Professional, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography