Livros sobre o tema "Computer security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Computer security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Encontre o texto completo da fonteW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Encontre o texto completo da fonteHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Encontre o texto completo da fonteKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos e Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Texto completo da fonteKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Texto completo da fonteFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Texto completo da fonteLopez, Javier, Jianying Zhou e Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Texto completo da fonteLopez, Javier, Jianying Zhou e Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Texto completo da fonteBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Texto completo da fonteKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón e Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Texto completo da fonteKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng e Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Texto completo da fonteHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Encontre o texto completo da fonteBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1986.
Encontre o texto completo da fonteCarroll, John Millar. Computer security. 2a ed. Boston: Butterworths, 1987.
Encontre o texto completo da fonteBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Encontre o texto completo da fonteBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Encontre o texto completo da fonteHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Encontre o texto completo da fonte(Firm), Shotlist, Films for the Humanities (Firm) e BDP Media Solutions (Firm), eds. Computer security. Princeton, NJ: Films for the Humanities & Sciences, 2001.
Encontre o texto completo da fonteCA. Simple Computer Security. New York: John Wiley & Sons, Ltd., 2007.
Encontre o texto completo da fonteHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteKotenko, Igor, e Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Texto completo da fonteRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin e Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Texto completo da fonteGorodetsky, Vladimir, Igor Kotenko e Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Texto completo da fonteGorodetsky, Vladimir, Igor Kotenko e Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Texto completo da fonteWang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Texto completo da fonteKotenko, Igor, e Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Texto completo da fonteBosworth, Seymour, Michel E. Kabay e Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Texto completo da fonteKizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Texto completo da fonteGorodetsky, Vladimir, Leonard Popyack e Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Texto completo da fonteBosworth, Seymour, Michel E. Kabay e Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Texto completo da fonteForcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Encontre o texto completo da fonteSeymour, Bosworth, Kabay Michel E e Whyne Eric 1981-, eds. Computer security handbook. 5a ed. Hoboken, N.J: John Wiley & Sons, 2009.
Encontre o texto completo da fonteDeborah, Russell, Gangemi G. T e Russell Deborah, eds. Computer Security Basics. 2a ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Encontre o texto completo da fonteM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Encontre o texto completo da fonteWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Encontre o texto completo da fonteinc, International Resource Development, ed. Computer security markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Encontre o texto completo da fonteSnekkenes, Einar. Computer Security: Proceedings. Berlin: Springer, 2003.
Encontre o texto completo da fonteRussell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
Encontre o texto completo da fonteE, Hutt Arthur, Bosworth Seymour e Hoyt Douglas B, eds. Computer security handbook. 3a ed. New York: Wiley, 1995.
Encontre o texto completo da fonteWatt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
Encontre o texto completo da fonteRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Encontre o texto completo da fonteBaker, Richard H. Computer security handbook. 2a ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Encontre o texto completo da fonteHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteBOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.
Encontre o texto completo da fonteStallone. Computer Security. Oryson Press, 2023.
Encontre o texto completo da fonteDu, Wenliang. Computer Security. 3a ed. WORLD SCIENTIFIC, 2022. http://dx.doi.org/10.1142/13053.
Texto completo da fonteComputer Security. Elsevier, 1987. http://dx.doi.org/10.1016/c2013-0-01065-1.
Texto completo da fonteGollmann, Dieter. Computer Security. Wiley & Sons, Incorporated, John, 2007.
Encontre o texto completo da fonteBrown, Lawrie, e William Stallings. Computer Security. Pearson Education, Limited, 2018.
Encontre o texto completo da fonteComputer Security. Butterworth-Heinemann, 1987.
Encontre o texto completo da fonte