Libros sobre el tema "Security threats"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security threats".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
1953-, Aldis Anne y Herd Graeme P, eds. Soft security threats and European security. London: Routledge, 2005.
Buscar texto completoBhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Buscar texto completoThreats to U.S. national security. Washington: U.S. G.P.O., 1997.
Buscar texto completoOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Buscar texto completoA, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Buscar texto completoInsider threats in cyber security. New York: Springer, 2010.
Buscar texto completoComputer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Buscar texto completoBarnett, Dana y Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Texto completoProbst, Christian W., Jeffrey Hunker, Dieter Gollmann y Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Texto completoJones, J. Anthony A., Trahel G. Vardanian y Christina Hakopian, eds. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Texto completoGaufman, Elizaveta. Security Threats and Public Perception. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Texto completoApikyan, Samuel y David Diamond, eds. Nuclear Threats and Security Challenges. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Texto completoFutter, Andrew, ed. Threats to Euro-Atlantic Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Texto completoRusdi, Siswanto. Maritime security and its threats. Jakarta: Maritime Security Coordinating Board, 2012.
Buscar texto completoUnited Service Institution of India., ed. Internal threats and national security. New Delhi: United Service Institution of India, 1986.
Buscar texto completoOren, Barak y Sheffer Gabriel, eds. Existential threats and civil security relations. Lanham, Md: Lexington Books, 2009.
Buscar texto completoNossal, Kim Richard, Christian Leuprecht y Todd Steven Hataley. Evolving transnational threats and border security. Kingston, Ont: Centre for International and Defence Policy, Queen's University, 2011.
Buscar texto completoDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Buscar texto completoKuznecova, Natal'ya. Threats to the organization's personnel security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1058832.
Texto completoHuman trafficking and future security threats. Lahore: Kitabistan, 2006.
Buscar texto completoDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Buscar texto completoCameron, Debra. Global network security: Threats and countermeasures. Charleston, SC: Computer Technology Research Corp., 2000.
Buscar texto completoNayak, Padmalaya, Niranjan Ray y P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Texto completoPhilippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Buscar texto completoSummers, Rita C. Secure computing: Threats and safeguards. New York: McGraw-Hill, 1997.
Buscar texto completoUnderstanding emerging security challenges: Threats and opportunities. New York, NY: Routledge, 2012.
Buscar texto completoThreats in the age of Obama. Ann Arbor, Mich: Nimble Books, 2009.
Buscar texto completoPreble, Christopher A. y John Mueller. A dangerous world?: Threat perception and U.S. national security. Washington, D.C: Cato Institute, 2014.
Buscar texto completoProject, Honeynet, ed. Know your enemy: Learning about security threats. 2a ed. Boston: Addison-Wesley, 2004.
Buscar texto completoHomeland security threats, countermeasures, and privacy issues. Boston: Artech House, 2011.
Buscar texto completoHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Buscar texto completoHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Buscar texto completoThomas, Ciza, Paula Fraga-Lamas y Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.
Texto completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Buscar texto completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Buscar texto completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Buscar texto completoArduin, Pierre-Emmanuel y Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Buscar texto completoHerd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.
Buscar texto completoHebron, Lui, Michel Gueldry y Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoUnderstanding New Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoGueldry, Michel, Gigi Gokcek y Lui Hebron, eds. Understanding New Security Threats. Routledge, 2019. http://dx.doi.org/10.4324/9781315102061.
Texto completoMogire, Edward. Victims as Security Threats. Routledge, 2016. http://dx.doi.org/10.4324/9781315548319.
Texto completoMogire, Edward O. Victims As Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoHebron, Lui, Michel Gueldry y Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoHebron, Lui, Michel Gueldry y Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoUnited States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. Washington, D.C: The Bureau, 1987.
Buscar texto completoPolitics of Cyber-Security Threats. Taylor & Francis Group, 2019.
Buscar texto completoHerd, Graeme P. y Anne Aldis. Soft Security Threats and Europe. Taylor & Francis Group, 2014.
Buscar texto completoGollmann, Dieter, Matt Bishop, Christian W. Probst y Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.
Buscar texto completoCommittee on Commerce Science (senate), United States Senate y United States United States Congress. Emerging Threats to Rail Security. Independently Published, 2019.
Buscar texto completo