Livros sobre o tema "Security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Poindexter, John M. Regional security, collective security, and American security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, 1986.
Encontre o texto completo da fonteMacHovec, Frank J. Security services, security science. Springfield, Ill., U.S.A: Thomas, 1992.
Encontre o texto completo da fonteTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Dordrecht: Springer, 2012.
Encontre o texto completo da fonteJarvis, Lee, e Jack Holland. Security. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Texto completo da fonteBourbeau, Philippe, ed. Security. Cambridge: Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Texto completo da fonte1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.
Encontre o texto completo da fonteOffice, National Preservation. Security. London: National Preservation Office, 1989.
Encontre o texto completo da fonteChartered Institute of Public Finance and Accountancy., ed. Security. London: Chartered Institute of Public Finance and Accountancy, 1991.
Encontre o texto completo da fonteFleming, Neil. Security. Toronto, Ont: Playwrights Guild of Canada, 2008.
Encontre o texto completo da fonteNational Examining Board for Supervisory Management., ed. Security. 2a ed. Oxford: Pergamon Open Learning, 1991.
Encontre o texto completo da fonteShade, Mike. Security. Round Rock, TX: Torquere Press, 2009.
Encontre o texto completo da fonteJob Corp (U.S.), ed. Security. [Washington, D.C.?]: Job Corps, 1991.
Encontre o texto completo da fonteBelinda, Fairthorne, e ICL Open Systems Architecture Group., eds. Security. New York: Prentice-Hall, 1993.
Encontre o texto completo da fontePublications, Key Note, ed. Security. 5a ed. London: Key Note Publications, 1989.
Encontre o texto completo da fonteNotePublications, Key, ed. Security. 6a ed. Hampton: Key Note Publications, 1990.
Encontre o texto completo da fonteZedner, Lucia. Security. New York, NY: Routledge, 2009.
Encontre o texto completo da fonteHong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Texto completo da fonteMacKinnon, Lachlan M., ed. Data Security and Security Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Texto completo da fonteDefense, U. S. Dept of. Information security program regulation: Security. [Washington, D.C.]: Dept. of Defense, 1995.
Encontre o texto completo da fonteMukute, Mutizwa, D. Mnyulwa e Sarah Kimakwa. Seed security for food security. [Harare]: PELUM Association, 2002.
Encontre o texto completo da fonte1949-, Hawkes Kenneth Gale, e United States. Dept. of Transportation, eds. Port security: Security force management. [Washington, D.C.]: U.S. Dept. of Transportation, 1998.
Encontre o texto completo da fonteEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Zürich: Center for Security Studies, 2006.
Encontre o texto completo da fonteMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Encontre o texto completo da fonteWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller e Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Encontre o texto completo da fonteLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Encontre o texto completo da fonteCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Texto completo da fonteOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Encontre o texto completo da fonteDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Encontre o texto completo da fonteVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Encontre o texto completo da fonteHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Encontre o texto completo da fonteVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Encontre o texto completo da fonteRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Encontre o texto completo da fonteGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Encontre o texto completo da fonteSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Encontre o texto completo da fontePublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Encontre o texto completo da fontePublishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.
Encontre o texto completo da fonteM, Ernest. Security. Independently Published, 2019.
Encontre o texto completo da fonteZedner, Lucia. Security. Routledge, 2009. http://dx.doi.org/10.4324/9780203871133.
Texto completo da fonteWilliams, Jonathan. Security. PublishAmerica, 2009.
Encontre o texto completo da fonteSecurity. 7a ed. Hampton: Key Note Publications, 1991.
Encontre o texto completo da fonteSecurity. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009270113.
Texto completo da fonteSecurity+. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-153-2.x5000-2.
Texto completo da fontePurpura, Philip P. Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781439894569.
Texto completo da fonteBaggot, Mandy. Security. Sapphire Star Publishing LLC, 2013.
Encontre o texto completo da fonteAnderson, Poul. Security. Aegypan, 2007.
Encontre o texto completo da fonteSecurity. Published for the National Examining Board for Supervisory Management by Pergamon Open Learning, 1990.
Encontre o texto completo da fonteAnderson, Poul. Security. CreateSpace Independent Publishing Platform, 2016.
Encontre o texto completo da fonteKrause, Keith, e Michael Williams. Security. Cambridge University Press, 2002.
Encontre o texto completo da fonteNowlan, James. Security. ULA Press, 2007.
Encontre o texto completo da fonteAnderson, Poul. Security. Start Publishing LLC, 2014.
Encontre o texto completo da fonte