Libros sobre el tema "Security solutions"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security solutions".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
M, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Buscar texto completoMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Buscar texto completoAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Buscar texto completoEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Buscar texto completoBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Buscar texto completoBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Buscar texto completoMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Buscar texto completoSarkar, Atanu, Suman Ranjan Sensarma y Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Texto completoMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5a ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
Buscar texto completoDiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Buscar texto completoTsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Texto completoStuart, McClure y Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2a ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Buscar texto completoDiamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Buscar texto completoMishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar y Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Texto completoRetail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
Buscar texto completoPC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
Buscar texto completoDiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Buscar texto completoBailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Buscar texto completoAbhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Buscar texto completoHatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Buscar texto completoTransportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Buscar texto completoWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2a ed. New York, USA: McGraw-Hill, 2010.
Buscar texto completoTursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Buscar texto completoDas, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel y Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
Texto completoJoel, Scambray y Kurtz George, eds. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
Buscar texto completoWorld Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
Buscar texto completoJoel, Scambray y Kurtz George, eds. Hacking exposed: Network security secrets and solutions. 3a ed. New York: Osborne/McGraw-Hill, 2001.
Buscar texto completoTran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Buscar texto completo1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Buscar texto completoHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Buscar texto completoHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Buscar texto completoHelton, Rich y Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Buscar texto completoJava Security Solutions. Wiley, 2002.
Buscar texto completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Buscar texto completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Buscar texto completoMueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Buscar texto completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Buscar texto completoMueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Buscar texto completoMueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3a ed. [United States]: IBM, International Technical Support Organization, 2006.
Buscar texto completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Buscar texto completoEnterprise security architecture using IBM Tivoli security solutions. 2a ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Buscar texto completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5a ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Buscar texto completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Buscar texto completoEnterprise security architecture: Using IBM Tivoli security solutions. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Buscar texto completoJournals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.
Buscar texto completo