Книги з теми "Security solutions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Security solutions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hruska, Jan. Computer security solutions. Boca Raton: CRC Press, 1990.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Ramachandran, Jay. Designing security architecture solutions. New York: John Wiley, 2002.
Mueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Bücker, Axel. Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Mason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
McClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
DiNicolo, Dan. PC Magazine Windows XP Security Solutions. New York: John Wiley & Sons, Ltd., 2005.
Tsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959: ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Scambray, Joel. Hacking exposed: Network security secrets & solutions. 2nd ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Diamond, Todd. Meskhetian Turks: Solutions and human security. New York, NY: The Open Society Institute, 1998.
Mishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Greggo, Alan. Retail security and loss prevention solutions. Boca Raton: Taylor & Francis, 2011.
DiNicolo, Dan. PC magazine Windows XP security solutions. Indianapolis, IN: Wiley Pub., 2005.
DiNicolo, Dan. PC Magazine Windows Vista Security Solutions. New York: John Wiley & Sons, Ltd., 2007.
Bailey, Carmen F. Analysis of security solutions in large enterprises. Monterey, Calif: Naval Postgraduate School, 2003.
Abhijit, Belapurkar, ed. Distributed systems security issues, processes, and solutions. Hoboken, NJ: John Wiley & Sons, 2009.
Hatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Sweet, Kathleen M. Transportation and cargo security: Threats and solutions. Upper Saddle River, NJ: Pearson/Prentice Hall, 2006.
Cache, Johnny. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.
Tursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Camberley: Conflict Studies Research Centre, 1998.
Das, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
McClure, Stuart. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
World Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.
McClure, Stuart. Hacking exposed: Network security secrets and solutions. 3rd ed. New York: Osborne/McGraw-Hill, 2001.
Tran, Khai. SonicWALL secure wireless network integrated solutions guide. Rockland, Mass: Syngress, 2008.
Doorn, Jorge H. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.
Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley, 2002.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Mueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Ramachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.
Mueller, John Paul. .NET Development Security Solutions. Sybex, 2003.
Mueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Enterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Enterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Journals, Element K. Enterprise Security Solutions: Student Edition. Element K Journals, 2004.