Livros sobre o tema "Security threats"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Security threats".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
1953-, Aldis Anne, e Herd Graeme P, eds. Soft security threats and European security. London: Routledge, 2005.
Encontre o texto completo da fonteBhaskar, Krish. Computer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Encontre o texto completo da fonteThreats to U.S. national security. Washington: U.S. G.P.O., 1997.
Encontre o texto completo da fonteOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Encontre o texto completo da fonteA, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Encontre o texto completo da fonteInsider threats in cyber security. New York: Springer, 2010.
Encontre o texto completo da fonteComputer security: Threats and countermeasures. Manchester: NCC Blackwell, 1993.
Encontre o texto completo da fonteBarnett, Dana, e Efraim Karsh. Soft Threats to National Security. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Texto completo da fonteProbst, Christian W., Jeffrey Hunker, Dieter Gollmann e Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Texto completo da fonteJones, J. Anthony A., Trahel G. Vardanian e Christina Hakopian, eds. Threats to Global Water Security. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Texto completo da fonteGaufman, Elizaveta. Security Threats and Public Perception. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Texto completo da fonteApikyan, Samuel, e David Diamond, eds. Nuclear Threats and Security Challenges. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Texto completo da fonteFutter, Andrew, ed. Threats to Euro-Atlantic Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Texto completo da fonteRusdi, Siswanto. Maritime security and its threats. Jakarta: Maritime Security Coordinating Board, 2012.
Encontre o texto completo da fonteUnited Service Institution of India., ed. Internal threats and national security. New Delhi: United Service Institution of India, 1986.
Encontre o texto completo da fonteOren, Barak, e Sheffer Gabriel, eds. Existential threats and civil security relations. Lanham, Md: Lexington Books, 2009.
Encontre o texto completo da fonteNossal, Kim Richard, Christian Leuprecht e Todd Steven Hataley. Evolving transnational threats and border security. Kingston, Ont: Centre for International and Defence Policy, Queen's University, 2011.
Encontre o texto completo da fonteDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Encontre o texto completo da fonteKuznecova, Natal'ya. Threats to the organization's personnel security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1058832.
Texto completo da fonteHuman trafficking and future security threats. Lahore: Kitabistan, 2006.
Encontre o texto completo da fonteDenning, Peter J. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Encontre o texto completo da fonteCameron, Debra. Global network security: Threats and countermeasures. Charleston, SC: Computer Technology Research Corp., 2000.
Encontre o texto completo da fonteNayak, Padmalaya, Niranjan Ray e P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Texto completo da fontePhilippe, B. Threats and countermeasures for network security. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Encontre o texto completo da fonteSummers, Rita C. Secure computing: Threats and safeguards. New York: McGraw-Hill, 1997.
Encontre o texto completo da fonteUnderstanding emerging security challenges: Threats and opportunities. New York, NY: Routledge, 2012.
Encontre o texto completo da fonteThreats in the age of Obama. Ann Arbor, Mich: Nimble Books, 2009.
Encontre o texto completo da fontePreble, Christopher A., e John Mueller. A dangerous world?: Threat perception and U.S. national security. Washington, D.C: Cato Institute, 2014.
Encontre o texto completo da fonteProject, Honeynet, ed. Know your enemy: Learning about security threats. 2a ed. Boston: Addison-Wesley, 2004.
Encontre o texto completo da fonteHomeland security threats, countermeasures, and privacy issues. Boston: Artech House, 2011.
Encontre o texto completo da fonteHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Encontre o texto completo da fonteHasseler, Bjorn. Security Threats. 1632, Inc., 2021.
Encontre o texto completo da fonteThomas, Ciza, Paula Fraga-Lamas e Tiago M. Fernández-Caramés, eds. Computer Security Threats. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.83233.
Texto completo da fonteArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Encontre o texto completo da fonteArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Encontre o texto completo da fonteArduin, Pierre-Emmanuel. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Encontre o texto completo da fonteArduin, Pierre-Emmanuel, e Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Encontre o texto completo da fonteHerd, Graeme P. Soft Security Threats and European Security. Routledge, 2006.
Encontre o texto completo da fonteHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteUnderstanding New Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteGueldry, Michel, Gigi Gokcek e Lui Hebron, eds. Understanding New Security Threats. Routledge, 2019. http://dx.doi.org/10.4324/9781315102061.
Texto completo da fonteMogire, Edward. Victims as Security Threats. Routledge, 2016. http://dx.doi.org/10.4324/9781315548319.
Texto completo da fonteMogire, Edward O. Victims As Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteHebron, Lui, Michel Gueldry e Gigi Gokcek. Understanding New Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteUnited States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. Washington, D.C: The Bureau, 1987.
Encontre o texto completo da fontePolitics of Cyber-Security Threats. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteHerd, Graeme P., e Anne Aldis. Soft Security Threats and Europe. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteGollmann, Dieter, Matt Bishop, Christian W. Probst e Jeffrey Hunker. Insider Threats in Cyber Security. Springer London, Limited, 2010.
Encontre o texto completo da fonteCommittee on Commerce Science (senate), United States Senate e United States United States Congress. Emerging Threats to Rail Security. Independently Published, 2019.
Encontre o texto completo da fonte