Livros sobre o tema "Information storage and retrieval systems - security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Information storage and retrieval systems - security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.
Encontre o texto completo da fonte), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Encontre o texto completo da fonteComputer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Encontre o texto completo da fonteUnited States. National Aeronautics and Space Administration., ed. NASA electronic library system (NELS): The system impact of security. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston-Clear Lake, 1993.
Encontre o texto completo da fonteGoldston, James K. A guide to understanding data remanence in automated information systems. 2a ed. [Fort George G. Meade, MD]: National Computer Security Center, 1991.
Encontre o texto completo da fonteNational Institute of Standards and Technology (U.S.). Security requirements for cryptographic modules. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007.
Encontre o texto completo da fonteUnited States. General Accounting Office. Information Management & Technology Division., ed. SSA pilot for centralized folder storage. Washington, D.C: The Office, 1992.
Encontre o texto completo da fonteUnited States. Department of Transportation. Office of Inspector General. Information security program. Washington, D.C: U.S Dept. of Transportation, Office of the Secretary of Transportation, Office of Inspector General, 2005.
Encontre o texto completo da fonteVictoria. Office of the Auditor-General. WoVG information security management framework. Melbourne, Vic: Victorian Government Printer, 2013.
Encontre o texto completo da fonteWitt-Barthel, Annegret. Chancen sozialorientierter Technikgestaltung: Politische Ansätze und Gestaltbarkeit der Informationstechnik in der sozialen Sicherung. Opladen: Westdeutscher Verlag, 1992.
Encontre o texto completo da fonteEloff, Jan H. P. Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands. Boston, MA: Springer US, 1999.
Encontre o texto completo da fonteHerold, Rebecca. Encyclopedia of information assurance. Boca Raton, FL: Auerbach Publications, 2011.
Encontre o texto completo da fonteWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 8. Sausalito, Calif: InfoSecurity Infrastructure, 2001.
Encontre o texto completo da fonteWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 5. Sausalito, Ca: Baseline Software, 1996.
Encontre o texto completo da fonteWood, Charles Cresson. Information security policies made easy: A comprehensive set of information security policies : version 7. Sausalito, Calif: Baseline Software, 1999.
Encontre o texto completo da fonteUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Encontre o texto completo da fonteOffice, General Accounting. Geological survey: Computer security. Washington, D.C: The Office, 1992.
Encontre o texto completo da fonteKizza, Joseph Migga. Guide to Computer Network Security. 2a ed. London: Springer London, 2013.
Encontre o texto completo da fonteMesa Redonda Regional Americana sobre la Informática en la Seguridad Social (1983 Bogotá, Colombia). Mesa Redonda Regional Americana sobre la Informática en la Seguridad Social, Bogotá, Colombia, 23 al 25 de noviembre de 1983. Buenos Aires: Secretaría General de la Asociación Internacional de la Seguridad Social, Oficina Regional para las Américas, 1985.
Encontre o texto completo da fonteThomas, Norman. Integrated security systems design: Concepts, specifications, and implementation. Amsterdam: Elsevier Butterworth-Heinemann, 2007.
Encontre o texto completo da fonteCannon, David L. CISA: Certified information systems auditor study guide. 2a ed. Hoboken, NJ: Wiley Technology Pub., 2008.
Encontre o texto completo da fonteMezhdunarodnai︠a︡, konferent︠s︡ii︠a︡ "Kompleksnai︠a︡ zashchita informat︠s︡ii" (14th 2009 Mahili︠o︡ŭ Belarus). Kompleksnai︠a︡ zashchita informat︠s︡ii: Materialy XIV Mezhdunarodnoĭ konferent︠s︡ii, 19-22 mai︠a︡ 2009 goda, Mogilev (Respublika Belarusʹ). Minsk: [s. n.], 2009.
Encontre o texto completo da fonteCISA: Certified information systems auditor study guide. 3a ed. Indianapolis, Ind: Wiley Pub., 2011.
Encontre o texto completo da fonteHerzig, Terrell W. Information security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.
Encontre o texto completo da fonteUnited States. Government Accountability Office, ed. Federal Reserve Banks: Areas for improvment in information systems controls. Washington, DC: U.S. Govt. Accountability Office, 2011.
Encontre o texto completo da fonteThuraisingham, Bhavani. Data and Application Security: Developments and Directions. Boston, MA: Kluwer Academic Publishers, 2002.
Encontre o texto completo da fonteCannon, David L. CISA - Certified Information Systems Auditor: Study guide. Indianapolis, Indiana: Wiley Pub., 2006.
Encontre o texto completo da fonteGerstein, Daniel M. Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International, 2006.
Encontre o texto completo da fonteservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteAtluri, Vijay. Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA. Boston, MA: Springer US, 2000.
Encontre o texto completo da fonteUnited States. Government Accountability Office, ed. Federal Reserve Banks: Areas for improvement in information security controls. Washington, DC: U.S. Govt. Accountability Office, 2010.
Encontre o texto completo da fonteScott, Ernest D. Police information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Energy Policy, Health Care, and Entitlements. Evaluating privacy, security, and fraud concerns with Obamacare's information sharing apparatus: Joint hearing before the Subcommittee on Energy Policy, Health Care, and Entitlements of the Committee on Oversight and Government Reform and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, July 17, 2013. Washington: U.S. Government Printing Office, 2014.
Encontre o texto completo da fonteBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Encontre o texto completo da fonteBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Encontre o texto completo da fonteBoche, Holger, H. Vincent Poor, Rafael F. Schaefer e Ashish Khisti. Information Theoretic Security and Privacy of Information Systems. Cambridge University Press, 2017.
Encontre o texto completo da fonteJia, Xiaohua, e Kan Yang. Security for Cloud Storage Systems. Springer London, Limited, 2013.
Encontre o texto completo da fonteCunha, Caio Almeida. Data Storage: Systems, Management and Security Issues. Nova Science Publishers, Incorporated, 2017.
Encontre o texto completo da fonteWheeler, Aaron, e Michael Winburn. Cloud Storage Security: A Practical Guide. Elsevier, 2015.
Encontre o texto completo da fonteCloud Storage Security: A Practical Guide. Elsevier Science & Technology Books, 2015.
Encontre o texto completo da fonteManaging Information System Security. MacMillan Education, Limited, 1997.
Encontre o texto completo da fonteSaeed, Khalid, e Jerzy Pejas. Information Processing and Security Systems. Springer, 2014.
Encontre o texto completo da fonteSaeed, Khalid, e Jerzy Pejas. Information Processing and Security Systems. Springer, 2005.
Encontre o texto completo da fonte(Editor), Khalid Saeed, e Jerzy Pejas (Editor), eds. Information Processing and Security Systems. Springer, 2005.
Encontre o texto completo da fonteGrama, Joanna Lyn, e vLab Solutions Staff. Laboratory Manual to Accompany Legal Issues in Information Security. Jones & Bartlett Learning, LLC, 2011.
Encontre o texto completo da fonteInformation Systems Security Lecture Notes in Computer Science Security and Cryptology. Springer-Verlag Berlin and Heidelberg GmbH &, 2013.
Encontre o texto completo da fonteSusanto, Heru, e Mohammad Nabil Almunawar. Information Security Management Systems. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteSecurity and privacy guidelines for health information systems. [Edmonton]: COACH, 1995.
Encontre o texto completo da fonteJavidi, Bahram. Optical and Digital Techniques for Information Security. Springer New York, 2010.
Encontre o texto completo da fonteNorman, Thomas L. Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems. Elsevier Science & Technology Books, 2014.
Encontre o texto completo da fonte