Libros sobre el tema "Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Buscar texto completoMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Buscar texto completoTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Buscar texto completoHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Texto completoMacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Texto completoDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Buscar texto completoSoftware security: Building security in. Upper Saddle River, NJ: Addison-Wesley, 2006.
Buscar texto completoMukute, Mutizwa, D. Mnyulwa y Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Buscar texto completoJarvis, Lee y Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Texto completoBourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Texto completoHausman, Kalani Kirk. Security+. Indianapolis, Ind: Que, 2003.
Buscar texto completoFleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.
Buscar texto completoNational Examining Board for Supervisory Management., ed. Security. 2a ed. Oxford: Pergamon Open Learning, 1991.
Buscar texto completoShade, Mike. Security. Round Rock, TX: Torquere Press, 2009.
Buscar texto completoJob Corp (U.S.), ed. Security. [Washington, D.C.?]: Job Corps, 1991.
Buscar texto completoBelinda, Fairthorne y ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.
Buscar texto completoPublications, Key Note, ed. Security. 5a ed. London: Key Note Publications, 1989.
Buscar texto completoNotePublications, Key, ed. Security. 6a ed. Hampton: Key Note Publications, 1990.
Buscar texto completo1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Buscar texto completoAmidon, Stephen. Security. New York: Farrar, Straus and Giroux, 2009.
Buscar texto completoZedner, Lucia. Security. New York, NY: Routledge, 2009.
Buscar texto completoOffice, National Preservation. Security. London: National Preservation Office, 1989.
Buscar texto completoChartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Buscar texto completoEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Buscar texto completo1949-, Deighton Anne, Mauer Victor y Eidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik., eds. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Buscar texto completoNoordergraaf, Alex. Securing systems with the Solaris security toolkit. Santa Clara, Calif: Sun Microsystems, 2003.
Buscar texto completoDeloitte & Touche. E-commerce security: Securing the network perimeter. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2002.
Buscar texto completoMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Buscar texto completoWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller y Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Buscar texto completoLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Buscar texto completoCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Texto completoOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Buscar texto completoRamonyai, Jerry. Decision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Buscar texto completoHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Buscar texto completoRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Buscar texto completoGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Buscar texto completoSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Buscar texto completoPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Buscar texto completoBrown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.
Buscar texto completoHalleen, Gary y Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.
Buscar texto completoSocial Security, Supplemental Security Income. [S.l: s.n., 2001.
Buscar texto completoPramanik, Sabyasachi, Debabrata Samanta, M. Vinay y Abhijit Guha, eds. Cyber Security and Network Security. Wiley, 2022. http://dx.doi.org/10.1002/9781119812555.
Texto completoBashevkin, Sylvia. Women’s Security as National Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.003.0006.
Texto completoPort security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Buscar texto completoStewart, Jim. SAP Security: SAP Security Essentials. Equity Press, 2005.
Buscar texto completoAgency, International Atomic Energy. Computer Security for Nuclear Security. International Atomic Energy Agency, 2021.
Buscar texto completoStaff, Red Dot Publications y Department Of DEFENSE. Electronic Security Systems: Security Engineering. Independently Published, 2017.
Buscar texto completoNewhart, Wilbur. Computer Security Exploits: Web Security. Lulu Press, Inc., 2012.
Buscar texto completo