Libri sul tema "Security solutions"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Security solutions".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
M, Jackson Keith, a cura di. Computer security solutions. Boca Raton: CRC Press, 1990.
Cerca il testo completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Cerca il testo completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Cerca il testo completoInc, NetLibrary, a cura di. Designing security architecture solutions. New York: John Wiley, 2002.
Cerca il testo completoMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Cerca il testo completoAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Cerca il testo completoEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Cerca il testo completoBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Cerca il testo completoBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Cerca il testo completoMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Cerca il testo completoSarkar, Atanu, Suman Ranjan Sensarma e Gary W. vanLoon, a cura di. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Testo completoMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5a ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
Cerca il testo completoDiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Cerca il testo completoTsacoumis, TP, a cura di. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Testo completoStuart, McClure, e Kurtz George, a cura di. Hacking exposed: Network security secrets & solutions. 2a ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Cerca il testo completoDiamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Cerca il testo completoMishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar e Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Testo completoRetail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
Cerca il testo completoPC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
Cerca il testo completoDiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Cerca il testo completoBailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Cerca il testo completoAbhijit, Belapurkar, a cura di. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Cerca il testo completoHatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Cerca il testo completoTransportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Cerca il testo completoWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2a ed. New York, USA: McGraw-Hill, 2010.
Cerca il testo completoTursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Cerca il testo completoDas, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel e Aboul Ella Hassanien, a cura di. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
Testo completoJoel, Scambray, e Kurtz George, a cura di. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
Cerca il testo completoWorld Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
Cerca il testo completoJoel, Scambray, e Kurtz George, a cura di. Hacking exposed: Network security secrets and solutions. 3a ed. New York: Osborne/McGraw-Hill, 2001.
Cerca il testo completoTran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Cerca il testo completo1956-, Rivero Laura C., a cura di. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Cerca il testo completoHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Cerca il testo completoHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Cerca il testo completoHelton, Rich, e Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Cerca il testo completoJava Security Solutions. Wiley, 2002.
Cerca il testo completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Cerca il testo completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Cerca il testo completoMueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Cerca il testo completoRamachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Cerca il testo completoMueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Cerca il testo completoMueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
Cerca il testo completoInternational Business Machines Corporation. International Technical Support Organization., a cura di. Enterprise security architecture using IBM Tivoli security solutions. 3a ed. [United States]: IBM, International Technical Support Organization, 2006.
Cerca il testo completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Cerca il testo completoEnterprise security architecture using IBM Tivoli security solutions. 2a ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Cerca il testo completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Cerca il testo completoInternational Business Machines Corporation. International Technical Support Organization., a cura di. Enterprise security architecture using IBM Tivoli security solutions. 5a ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Cerca il testo completoRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Cerca il testo completoEnterprise security architecture: Using IBM Tivoli security solutions. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Cerca il testo completoJournals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.
Cerca il testo completo