Libros sobre el tema "Computer security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Computer security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Buscar texto completoW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Buscar texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos y Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Texto completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Texto completoFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Texto completoLopez, Javier, Jianying Zhou y Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Texto completoLopez, Javier, Jianying Zhou y Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Texto completoBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Texto completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón y Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Texto completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng y Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1986.
Buscar texto completoCarroll, John Millar. Computer security. 2a ed. Boston: Butterworths, 1987.
Buscar texto completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Buscar texto completoBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Buscar texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completo(Firm), Shotlist, Films for the Humanities (Firm) y BDP Media Solutions (Firm), eds. Computer security. Princeton, NJ: Films for the Humanities & Sciences, 2001.
Buscar texto completoCA. Simple Computer Security. New York: John Wiley & Sons, Ltd., 2007.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoKotenko, Igor y Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Texto completoRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin y Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Texto completoGorodetsky, Vladimir, Igor Kotenko y Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Texto completoGorodetsky, Vladimir, Igor Kotenko y Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Texto completoWang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Texto completoKotenko, Igor y Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Texto completoBosworth, Seymour, Michel E. Kabay y Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Texto completoKizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Texto completoGorodetsky, Vladimir, Leonard Popyack y Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Texto completoBosworth, Seymour, Michel E. Kabay y Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Texto completoForcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Buscar texto completoSeymour, Bosworth, Kabay Michel E y Whyne Eric 1981-, eds. Computer security handbook. 5a ed. Hoboken, N.J: John Wiley & Sons, 2009.
Buscar texto completoDeborah, Russell, Gangemi G. T y Russell Deborah, eds. Computer Security Basics. 2a ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Buscar texto completoM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Buscar texto completoWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Buscar texto completoinc, International Resource Development, ed. Computer security markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Buscar texto completoSnekkenes, Einar. Computer Security: Proceedings. Berlin: Springer, 2003.
Buscar texto completoRussell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
Buscar texto completoE, Hutt Arthur, Bosworth Seymour y Hoyt Douglas B, eds. Computer security handbook. 3a ed. New York: Wiley, 1995.
Buscar texto completoWatt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
Buscar texto completoRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Buscar texto completoBaker, Richard H. Computer security handbook. 2a ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoBOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.
Buscar texto completoStallone. Computer Security. Oryson Press, 2023.
Buscar texto completoDu, Wenliang. Computer Security. 3a ed. WORLD SCIENTIFIC, 2022. http://dx.doi.org/10.1142/13053.
Texto completoComputer Security. Elsevier, 1987. http://dx.doi.org/10.1016/c2013-0-01065-1.
Texto completoGollmann, Dieter. Computer Security. Wiley & Sons, Incorporated, John, 2007.
Buscar texto completoBrown, Lawrie y William Stallings. Computer Security. Pearson Education, Limited, 2018.
Buscar texto completoComputer Security. Butterworth-Heinemann, 1987.
Buscar texto completo