Libros sobre el tema "Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Buscar texto completoMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Buscar texto completoTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Buscar texto completoJarvis, Lee y Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Texto completoBourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Texto completo1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Buscar texto completoOffice, National Preservation. Security. London: National Preservation Office, 1989.
Buscar texto completoChartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Buscar texto completoNational Examining Board for Supervisory Management., ed. Security. 2a ed. Oxford: Pergamon Open Learning, 1991.
Buscar texto completoBelinda, Fairthorne y ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.
Buscar texto completoPublications, Key Note, ed. Security. 5a ed. London: Key Note Publications, 1989.
Buscar texto completoNotePublications, Key, ed. Security. 6a ed. Hampton: Key Note Publications, 1990.
Buscar texto completoHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Texto completoMacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Texto completoDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Buscar texto completoMukute, Mutizwa, D. Mnyulwa y Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Buscar texto completo1949-, Hawkes Kenneth Gale y United States. Dept. of Transportation, eds. Port security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Buscar texto completoEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Buscar texto completoMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Buscar texto completoWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller y Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Buscar texto completoLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Buscar texto completoCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Texto completoOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Buscar texto completoDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Buscar texto completoHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Buscar texto completoRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Buscar texto completoGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Buscar texto completoSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Buscar texto completoPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Buscar texto completoPublishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.
Buscar texto completoZedner, Lucia. Security. Routledge, 2009. http://dx.doi.org/10.4324/9780203871133.
Texto completoSecurity. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009270113.
Texto completoPurpura, Philip P. Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781439894569.
Texto completoSecurity. Published for the National Examining Board for Supervisory Management by Pergamon Open Learning, 1990.
Buscar texto completoAnderson, Poul. Security. CreateSpace Independent Publishing Platform, 2016.
Buscar texto completoKrause, Keith y Michael Williams. Security. Cambridge University Press, 2002.
Buscar texto completo