Livros sobre o tema "Trust by the way of security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Trust by the way of security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Bacevich, A. J. Breach of trust: How Americans failed their soldiers and their country. New York: Metropolitan Books, Henry Holt and Company, 2013.
Encontre o texto completo da fonteCreating an American lake: United States imperialism and strategic security in the Pacific Basin, 1945-1947. Westport, Conn: Greenwood Press, 2001.
Encontre o texto completo da fonteBörsch-Supan, Axel. The German public pension system: How it was, how it will be. Cambridge, MA: National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteBörsch-Supan, Axel. The German public pension system: How it was, how it will be. Cambridge, Mass: National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteGarbis, Jason, e Jerry W. Chapman. Zero Trust Security. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8.
Texto completo da fonteRoman, Rodrigo, e Jianying Zhou, eds. Security and Trust Management. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91859-0.
Texto completo da fonteKatsikas, Sokratis K., e Cristina Alcaraz, eds. Security and Trust Management. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01141-3.
Texto completo da fonteBarthe, Gilles, Evangelos Markatos e Pierangela Samarati, eds. Security and Trust Management. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2.
Texto completo da fonteJøsang, Audun, Pierangela Samarati e Marinella Petrocchi, eds. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4.
Texto completo da fonteAccorsi, Rafael, e Silvio Ranise, eds. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7.
Texto completo da fonteSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale e Francesco Regazzoni, eds. Hardware Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Texto completo da fonteMeadows, Catherine, e Carmen Fernandez-Gago, eds. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29963-6.
Texto completo da fonteCuellar, Jorge, Javier Lopez, Gilles Barthe e Alexander Pretschner, eds. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22444-7.
Texto completo da fonteMauw, Sjouke, e Mauro Conti, eds. Security and Trust Management. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31511-5.
Texto completo da fonteMarkantonakis, Kostantinos, e Marinella Petrocchi, eds. Security and Trust Management. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4.
Texto completo da fonteMauw, Sjouke, e Christian Damsgaard Jensen, eds. Security and Trust Management. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11851-2.
Texto completo da fonteForesti, Sara, ed. Security and Trust Management. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24858-5.
Texto completo da fonteLivraga, Giovanni, e Chris Mitchell, eds. Security and Trust Management. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68063-7.
Texto completo da fonteDivision, United States General Accounting Office Accounting and Information Management. Social Security trust funds. Washington, D.C: The Office, 1995.
Encontre o texto completo da fonteRios, Ruben, e Joachim Posegga, eds. Security and Trust Management. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47198-8.
Texto completo da fonteLenzini, Gabriele, e Weizhi Meng, eds. Security and Trust Management. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29504-1.
Texto completo da fontePiessens, Frank, e Luca Viganò, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49635-0.
Texto completo da fonteBauer, Lujo, e Ralf Küsters, eds. Principles of Security and Trust. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89722-6.
Texto completo da fonteMishra, Prabhat, Swarup Bhunia e Mark Tehranipoor, eds. Hardware IP Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Texto completo da fonteFocardi, Riccardo, e Andrew Myers, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46666-7.
Texto completo da fonteBasin, David, e John C. Mitchell, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36830-1.
Texto completo da fonteMaffei, Matteo, e Mark Ryan, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-54455-6.
Texto completo da fonteNielson, Flemming, e David Sands, eds. Principles of Security and Trust. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17138-4.
Texto completo da fonteDegano, Pierpaolo, e Joshua D. Guttman, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28641-4.
Texto completo da fonteAbadi, Martín, e Steve Kremer, eds. Principles of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54792-8.
Texto completo da fonteViolation of trust: Whatever happened to the social security trust funds? Fairfax, Va: The Seniors Coalition, 1995.
Encontre o texto completo da fonteZou, Xukai. Trust and security in collaborative computing. Hackensack, NJ: World Scientific, 2008.
Encontre o texto completo da fonteTehranipoor, Mohammad, e Cliff Wang, eds. Introduction to Hardware Security and Trust. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-8080-9.
Texto completo da fonteBarthe, Gilles, Anupam Datta e Sandro Etalle, eds. Formal Aspects of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29420-4.
Texto completo da fonteDimitrakos, Theo, Fabio Martinelli, Peter Y. A. Ryan e Steve Schneider, eds. Formal Aspects in Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75227-1.
Texto completo da fonteBonchi, Francesco, Elena Ferrari, Bradley Malin e Yücel Saygin, eds. Privacy, Security, and Trust in KDD. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78478-4.
Texto completo da fonteDimitrakos, Theo, e Fabio Martinelli, eds. Formal Aspects in Security and Trust. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b104303.
Texto completo da fonteDegano, Pierpaolo, Joshua Guttman e Fabio Martinelli, eds. Formal Aspects in Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01465-9.
Texto completo da fonteBonchi, Francesco, Elena Ferrari, Wei Jiang e Bradley Malin, eds. Privacy, Security, and Trust in KDD. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01718-6.
Texto completo da fonteDegano, Pierpaolo, Sandro Etalle e Joshua Guttman, eds. Formal Aspects of Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19751-2.
Texto completo da fonteDimitrakos, Theo, Fabio Martinelli, Peter Y. A. Ryan e Steve Schneider, eds. Formal Aspects in Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11679219.
Texto completo da fonteDegano, Pierpaolo, e Joshua D. Guttman, eds. Formal Aspects in Security and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12459-4.
Texto completo da fonteZou, Xukai. Trust and security in collaborative computing. Hackensack, NJ: World Scientific, 2008.
Encontre o texto completo da fonteCliff, Wang, e SpringerLink (Online service), eds. Introduction to Hardware Security and Trust. New York, NY: Springer Science+Business Media, LLC, 2012.
Encontre o texto completo da fonteDeveloping trust: Online privacy and security. Berkeley, CA: Apress, 2002.
Encontre o texto completo da fonteJean-Marc, Seigneur, e Slagell Adam 1977-, eds. Collaborative computer security and trust management. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteTakashi, Oshio. Social security and trust fund management. Cambridge, MA: National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteZou, Xukai. Trust and security in collaborative computing. Hackensack, NJ: World Scientific, 2008.
Encontre o texto completo da fonteOshio, Takashi. Social security and trust fund management. Cambridge, Mass: National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteGroß, Thomas, e Theo Tryfonas, eds. Socio-Technical Aspects in Security and Trust. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55958-8.
Texto completo da fonte