Libri sul tema "Security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Cerca il testo completoMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Cerca il testo completoTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Cerca il testo completoHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Testo completoMacKinnon, Lachlan M., a cura di. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Testo completoDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Cerca il testo completoSoftware security: Building security in. Upper Saddle River, NJ: Addison-Wesley, 2006.
Cerca il testo completoMukute, Mutizwa, D. Mnyulwa e Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Cerca il testo completoJarvis, Lee, e Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Testo completoBourbeau, Philippe, a cura di. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Testo completoHausman, Kalani Kirk. Security+. Indianapolis, Ind: Que, 2003.
Cerca il testo completoFleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.
Cerca il testo completoNational Examining Board for Supervisory Management., a cura di. Security. 2a ed. Oxford: Pergamon Open Learning, 1991.
Cerca il testo completoShade, Mike. Security. Round Rock, TX: Torquere Press, 2009.
Cerca il testo completoJob Corp (U.S.), a cura di. Security. [Washington, D.C.?]: Job Corps, 1991.
Cerca il testo completoBelinda, Fairthorne, e ICL Open Systems Architecture Group., a cura di. Security. New York: Prentice-Hall, 1993.
Cerca il testo completoPublications, Key Note, a cura di. Security. 5a ed. London: Key Note Publications, 1989.
Cerca il testo completoNotePublications, Key, a cura di. Security. 6a ed. Hampton: Key Note Publications, 1990.
Cerca il testo completo1961-, Meyers Michael, a cura di. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Cerca il testo completoAmidon, Stephen. Security. New York: Farrar, Straus and Giroux, 2009.
Cerca il testo completoZedner, Lucia. Security. New York, NY: Routledge, 2009.
Cerca il testo completoOffice, National Preservation. Security. London: National Preservation Office, 1989.
Cerca il testo completoChartered Institute of Public Finance and Accountancy., a cura di. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Cerca il testo completoEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, a cura di. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Cerca il testo completo1949-, Deighton Anne, Mauer Victor e Eidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik., a cura di. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Cerca il testo completoNoordergraaf, Alex. Securing systems with the Solaris security toolkit. Santa Clara, Calif: Sun Microsystems, 2003.
Cerca il testo completoDeloitte & Touche. E-commerce security: Securing the network perimeter. Rolling Meadows, IL: Information Systems Audit and Control Foundation, 2002.
Cerca il testo completoMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Cerca il testo completoWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller e Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Cerca il testo completoLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Cerca il testo completoCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Testo completoOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Cerca il testo completoRamonyai, Jerry. Decision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Cerca il testo completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Cerca il testo completoHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Cerca il testo completoRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Cerca il testo completoGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Cerca il testo completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Cerca il testo completoSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Cerca il testo completoPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Cerca il testo completoBrown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.
Cerca il testo completoHalleen, Gary, e Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.
Cerca il testo completoSocial Security, Supplemental Security Income. [S.l: s.n., 2001.
Cerca il testo completoPramanik, Sabyasachi, Debabrata Samanta, M. Vinay e Abhijit Guha, a cura di. Cyber Security and Network Security. Wiley, 2022. http://dx.doi.org/10.1002/9781119812555.
Testo completoBashevkin, Sylvia. Women’s Security as National Security. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.003.0006.
Testo completoPort security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Cerca il testo completoStewart, Jim. SAP Security: SAP Security Essentials. Equity Press, 2005.
Cerca il testo completoAgency, International Atomic Energy. Computer Security for Nuclear Security. International Atomic Energy Agency, 2021.
Cerca il testo completoStaff, Red Dot Publications, e Department Of DEFENSE. Electronic Security Systems: Security Engineering. Independently Published, 2017.
Cerca il testo completoNewhart, Wilbur. Computer Security Exploits: Web Security. Lulu Press, Inc., 2012.
Cerca il testo completo