Libri sul tema "Information security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Information security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo e Rolly Intan, a cura di. Information Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.
Testo completoLongley, Dennis, Michael Shain e William Caelli. Information Security. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.
Testo completoMambo, Masahiro, e Yuliang Zheng. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.
Testo completoStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.
Testo completoChow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui e Siu Ming Yiu, a cura di. Information Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.
Testo completoChan, Agnes Hui, e Virgil Gligor, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.
Testo completoGollmann, Dieter, e Felix C. Freiling, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.
Testo completoSusilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li e Rolly Intan, a cura di. Information Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.
Testo completoChen, Liqun, Mark Manulis e Steve Schneider, a cura di. Information Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.
Testo completoZhou, Jianying, Javier Lopez, Robert H. Deng e Feng Bao, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.
Testo completoOkamoto, Eiji, George Davida e Masahiro Mambo, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0030404.
Testo completoStamp, Mark. Information Security. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118027974.
Testo completoGaray, Juan A., Arjen K. Lenstra, Masahiro Mambo e René Peralta, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75496-1.
Testo completoDavida, George I., e Yair Frankel, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45439-x.
Testo completoNguyen, Phong Q., e Jianying Zhou, a cura di. Information Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69659-1.
Testo completoVenter, Hein, Marianne Loock, Marijke Coetzee, Mariki Eloff e Jan Eloff, a cura di. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7.
Testo completoLopez, Javier, e Chris J. Mitchell, a cura di. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23318-5.
Testo completoSamarati, Pierangela, Moti Yung, Fabio Martinelli e Claudio A. Ardagna, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04474-8.
Testo completoDesmedt, Yvo, a cura di. Information Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27659-5.
Testo completoBurmester, Mike, Gene Tsudik, Spyros Magliveras e Ivana Ilić, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18178-8.
Testo completoKatsikas, Sokratis K., Javier López, Michael Backes, Stefanos Gritzalis e Bart Preneel, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11836810.
Testo completoLin, Zhiqiang, Charalampos Papamanthou e Michalis Polychronakis, a cura di. Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30215-3.
Testo completoZhang, Kan, e Yuliang Zheng, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b100936.
Testo completoBoyd, Colin, e Wenbo Mao, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13828.
Testo completoWu, Tzong-Chen, Chin-Laung Lei, Vincent Rijmen e Der-Tsai Lee, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85886-7.
Testo completoGoos, Gerhard, Juris Hartmanis, Jan van Leeuwen, Josef Pieprzyk, Jennifer Seberry e Eiji Okamoto, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44456-4.
Testo completoLai, Xuejia, Jianying Zhou e Hui Li, a cura di. Information Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24861-0.
Testo completoBishop, Matt, e Anderson C. A. Nascimento, a cura di. Information Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45871-7.
Testo completoSusilo, Willy, Xiaofeng Chen, Fuchun Guo, Yudi Zhang e Rolly Intan, a cura di. Information Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22390-7.
Testo completoUnited States. Marshals Service. Internal Security Division. Information security. Washington, D.C.?]: U.S. Department of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division, 1991.
Cerca il testo completoStamp, Mark. Information Security. New York: John Wiley & Sons, Ltd., 2005.
Cerca il testo completoAmerican Institute of Certified Public Accountants., a cura di. Information security. Jersey City, NJ: American Institute of Certified Public Accountants, 1995.
Cerca il testo completoBrewer, Michael. Information security. London: DISC, BSi Standards, 1992.
Cerca il testo completoUnited States. Marshals Service. Internal Security Division, a cura di. Information security. [Washington, D.C.?]: U.S. Dept. of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division, 1991.
Cerca il testo completoAthanasopoulos, Elias, e Bart Mennink, a cura di. Information Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49187-0.
Testo completoE, Ettinger J., a cura di. Information security. London: Chapman & Hall, 1993.
Cerca il testo completoLiedtke, Thomas. Information Security. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-45711-2.
Testo completoMouha, Nicky, e Nick Nikiforakis, a cura di. Information Security. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-75764-8.
Testo completoMouha, Nicky, e Nick Nikiforakis, a cura di. Information Security. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-75757-0.
Testo completoDrevin, Lynette, Suné Von Solms e Marianthi Theocharidou, a cura di. Information Security Education. Information Security in Action. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2.
Testo completoDrevin, Lynette, e Marianthi Theocharidou, a cura di. Information Security Education. Education in Proactive Information Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23451-5.
Testo completoDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Cerca il testo completoSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Testo completoKim, Hyoungshick, a cura di. Information Security Applications. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0.
Testo completoTripathy, Somanath, Rudrapatna K. Shyamasundar e Rajiv Ranjan, a cura di. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Testo completoJhanjhi, Noor Zaman, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun e João Manuel R. S. Tavares. Information Security Handbook. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228.
Testo completoSmith, Adam, a cura di. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32284-6.
Testo completoDesmedt, Yvo, a cura di. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10230-1.
Testo completoKim, Ho-won, e Dooho Choi, a cura di. Information Security Applications. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2.
Testo completoKurosawa, Kaoru, a cura di. Information Theoretic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14496-7.
Testo completo