Libros sobre el tema "Information security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Information security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Drevin, Lynette, Suné Von Solms y Marianthi Theocharidou, eds. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.
Texto completoLiu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo y Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Texto completoLongley, Dennis, Michael Shain y William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Texto completoMambo, Masahiro y Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Texto completoStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Texto completoChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui y Siu Ming Yiu, eds. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Texto completoChan, Agnes Hui y Virgil Gligor, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Texto completoGollmann, Dieter y Felix C. Freiling, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Texto completoSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li y Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Texto completoChen, Liqun, Mark Manulis y Steve Schneider, eds. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Texto completoZhou, Jianying, Javier Lopez, Robert H. Deng y Feng Bao, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.
Texto completoOkamoto, Eiji, George Davida y Masahiro Mambo, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030404.
Texto completoStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118027974.
Texto completoGaray, Juan A., Arjen K. Lenstra, Masahiro Mambo y René Peralta, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75496-1.
Texto completoDavida, George I. y Yair Frankel, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45439-x.
Texto completoNguyen, Phong Q. y Jianying Zhou, eds. Information Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69659-1.
Texto completoVenter, Hein, Marianne Loock, Marijke Coetzee, Mariki Eloff y Jan Eloff, eds. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7.
Texto completoLopez, Javier y Chris J. Mitchell, eds. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23318-5.
Texto completoSamarati, Pierangela, Moti Yung, Fabio Martinelli y Claudio A. Ardagna, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04474-8.
Texto completoDesmedt, Yvo, ed. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27659-5.
Texto completoBurmester, Mike, Gene Tsudik, Spyros Magliveras y Ivana Ilić, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18178-8.
Texto completoKatsikas, Sokratis K., Javier López, Michael Backes, Stefanos Gritzalis y Bart Preneel, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11836810.
Texto completoLin, Zhiqiang, Charalampos Papamanthou y Michalis Polychronakis, eds. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30215-3.
Texto completoZhang, Kan y Yuliang Zheng, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b100936.
Texto completoBoyd, Colin y Wenbo Mao, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13828.
Texto completoWu, Tzong-Chen, Chin-Laung Lei, Vincent Rijmen y Der-Tsai Lee, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85886-7.
Texto completoGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen, Josef Pieprzyk, Jennifer Seberry y Eiji Okamoto, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44456-4.
Texto completoLai, Xuejia, Jianying Zhou y Hui Li, eds. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24861-0.
Texto completoBishop, Matt y Anderson C. A. Nascimento, eds. Information Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45871-7.
Texto completoSusilo, Willy, Xiaofeng Chen, Fuchun Guo, Yudi Zhang y Rolly Intan, eds. Information Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22390-7.
Texto completoAmerican Institute of Certified Public Accountants., ed. Information security. Jersey City, NJ: American Institute of Certified Public Accountants, 1995.
Buscar texto completoBrewer, Michael. Information security. London: DISC, BSi Standards, 1992.
Buscar texto completoUnited States. Marshals Service. Internal Security Division, ed. Information security. [Washington, D.C.?]: U.S. Dept. of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division, 1991.
Buscar texto completoE, Ettinger J., ed. Information security. London: Chapman & Hall, 1993.
Buscar texto completoStamp, Mark. Information Security. New York: John Wiley & Sons, Ltd., 2005.
Buscar texto completoAthanasopoulos, Elias y Bart Mennink, eds. Information Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49187-0.
Texto completoDrevin, Lynette y Marianthi Theocharidou, eds. Information Security Education. Education in Proactive Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23451-5.
Texto completoDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Buscar texto completoSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Texto completoJustin, Peltier y Blackley John A, eds. Information security fundamentals. Boca Raton, Fla: Auerbach Publications, 2005.
Buscar texto completoManaging information security. Burlington, MA: Elsevier, 2010.
Buscar texto completoInstitution, British Standards, ed. IMS: Information security. London: BSi, 2003.
Buscar texto completoKim, Hyoungshick, ed. Information Security Applications. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0.
Texto completoTripathy, Somanath, Rudrapatna K. Shyamasundar y Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Texto completoJhanjhi, Noor Zaman, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun y João Manuel R. S. Tavares. Information Security Handbook. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228.
Texto completoSmith, Adam, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32284-6.
Texto completoDesmedt, Yvo, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10230-1.
Texto completoKim, Ho-won y Dooho Choi, eds. Information Security Applications. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2.
Texto completoKurosawa, Kaoru, ed. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14496-7.
Texto completoGanapathy, Vinod, Trent Jaeger y R. K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.
Texto completo