Livros sobre o tema "Security solutions"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Security solutions".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
M, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Encontre o texto completo da fonteHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Encontre o texto completo da fonteInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Encontre o texto completo da fonteMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Encontre o texto completo da fonteAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Encontre o texto completo da fonteEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Encontre o texto completo da fonteBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Encontre o texto completo da fonteBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Encontre o texto completo da fonteMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Encontre o texto completo da fonteSarkar, Atanu, Suman Ranjan Sensarma e Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Texto completo da fonteMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5a ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
Encontre o texto completo da fonteDiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Encontre o texto completo da fonteTsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Texto completo da fonteStuart, McClure, e Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2a ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Encontre o texto completo da fonteDiamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Encontre o texto completo da fonteMishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar e Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Texto completo da fonteRetail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
Encontre o texto completo da fontePC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
Encontre o texto completo da fonteDiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Encontre o texto completo da fonteBailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Encontre o texto completo da fonteAbhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Encontre o texto completo da fonteHatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Encontre o texto completo da fonteTransportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Encontre o texto completo da fonteWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2a ed. New York, USA: McGraw-Hill, 2010.
Encontre o texto completo da fonteTursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Encontre o texto completo da fonteDas, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel e Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
Texto completo da fonteJoel, Scambray, e Kurtz George, eds. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
Encontre o texto completo da fonteWorld Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
Encontre o texto completo da fonteJoel, Scambray, e Kurtz George, eds. Hacking exposed: Network security secrets and solutions. 3a ed. New York: Osborne/McGraw-Hill, 2001.
Encontre o texto completo da fonteTran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Encontre o texto completo da fonte1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Encontre o texto completo da fonteHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Encontre o texto completo da fonteHasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Encontre o texto completo da fonteHelton, Rich, e Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Encontre o texto completo da fonteJava Security Solutions. Wiley, 2002.
Encontre o texto completo da fonteRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Encontre o texto completo da fonteRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Encontre o texto completo da fonteMueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Encontre o texto completo da fonteRamachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Encontre o texto completo da fonteMueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Encontre o texto completo da fonteMueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3a ed. [United States]: IBM, International Technical Support Organization, 2006.
Encontre o texto completo da fonteRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Encontre o texto completo da fonteEnterprise security architecture using IBM Tivoli security solutions. 2a ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Encontre o texto completo da fonteRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5a ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Encontre o texto completo da fonteRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Encontre o texto completo da fonteEnterprise security architecture: Using IBM Tivoli security solutions. 4a ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Encontre o texto completo da fonteJournals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.
Encontre o texto completo da fonte