Libri sul tema "Security threats"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Security threats".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
1953-, Aldis Anne, e Herd Graeme P, a cura di. Soft security threats and European security. London: Routledge, 2005.
Cerca il testo completoBhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Cerca il testo completoThreats to U.S. national security. Washington: U.S. G.P.O., 1997.
Cerca il testo completoOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Cerca il testo completoA, Campbell Andrew, a cura di. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Cerca il testo completoInsider threats in cyber security. New York: Springer, 2010.
Cerca il testo completoComputer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Cerca il testo completoBarnett, Dana, e Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Testo completoProbst, Christian W., Jeffrey Hunker, Dieter Gollmann e Matt Bishop, a cura di. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Testo completoJones, J. Anthony A., Trahel G. Vardanian e Christina Hakopian, a cura di. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Testo completoGaufman, Elizaveta. Security Threats and Public Perception. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Testo completoApikyan, Samuel, e David Diamond, a cura di. Nuclear Threats and Security Challenges. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Testo completoFutter, Andrew, a cura di. Threats to Euro-Atlantic Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Testo completoRusdi, Siswanto. Maritime security and its threats. Jakarta: Maritime Security Coordinating Board, 2012.
Cerca il testo completoUnited Service Institution of India., a cura di. Internal threats and national security. New Delhi: United Service Institution of India, 1986.
Cerca il testo completoOren, Barak, e Sheffer Gabriel, a cura di. Existential threats and civil security relations. Lanham, Md: Lexington Books, 2009.
Cerca il testo completoNossal, Kim Richard, Christian Leuprecht e Todd Steven Hataley. Evolving transnational threats and border security. Kingston, Ont: Centre for International and Defence Policy, Queen's University, 2011.
Cerca il testo completoDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Cerca il testo completoKuznecova, Natal'ya. Threats to the organization's personnel security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1058832.
Testo completoHuman trafficking and future security threats. Lahore: Kitabistan, 2006.
Cerca il testo completoDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Cerca il testo completoCameron, Debra. Global network security: Threats and countermeasures. Charleston, SC: Computer Technology Research Corp., 2000.
Cerca il testo completoNayak, Padmalaya, Niranjan Ray e P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Testo completoPhilippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Cerca il testo completoSummers, Rita C. Secure computing: Threats and safeguards. New York: McGraw-Hill, 1997.
Cerca il testo completoUnderstanding emerging security challenges: Threats and opportunities. New York, NY: Routledge, 2012.
Cerca il testo completoThreats in the age of Obama. Ann Arbor, Mich: Nimble Books, 2009.
Cerca il testo completoPreble, Christopher A., e John Mueller. A dangerous world?: Threat perception and U.S. national security. Washington, D.C: Cato Institute, 2014.
Cerca il testo completoProject, Honeynet, a cura di. Know your enemy: Learning about security threats. 2a ed. Boston: Addison-Wesley, 2004.
Cerca il testo completoHomeland security threats, countermeasures, and privacy issues. Boston: Artech House, 2011.
Cerca il testo completoHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Cerca il testo completoHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Cerca il testo completoThomas, Ciza, Paula Fraga-Lamas e Tiago M. Fernández-Caramés, a cura di. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.
Testo completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Cerca il testo completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Cerca il testo completoArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Cerca il testo completoArduin, Pierre-Emmanuel, e Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Cerca il testo completoHerd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.
Cerca il testo completoHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoUnderstanding New Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoGueldry, Michel, Gigi Gokcek e Lui Hebron, a cura di. Understanding New Security Threats. Routledge, 2019. http://dx.doi.org/10.4324/9781315102061.
Testo completoMogire, Edward. Victims as Security Threats. Routledge, 2016. http://dx.doi.org/10.4324/9781315548319.
Testo completoMogire, Edward O. Victims As Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoUnited States. Bureau of Alcohol, Tobacco, and Firearms., a cura di. Bomb threats and physical security planning. Washington, D.C: The Bureau, 1987.
Cerca il testo completoPolitics of Cyber-Security Threats. Taylor & Francis Group, 2019.
Cerca il testo completoHerd, Graeme P., e Anne Aldis. Soft Security Threats and Europe. Taylor & Francis Group, 2014.
Cerca il testo completoGollmann, Dieter, Matt Bishop, Christian W. Probst e Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.
Cerca il testo completoCommittee on Commerce Science (senate), United States Senate e United States United States Congress. Emerging Threats to Rail Security. Independently Published, 2019.
Cerca il testo completo