Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Information SecurityMark S. Merkow2014-05-26Information Security: Principles and Practices, Second Editi...ISBN-13:0133589633
2Information SecurityMark Stamp2011-11-08Now updated—your expert guide to twenty-first century info...ISBN-13:9781118027967
3Computer SecurityWilliam Stallings2012Computer Security: Principles and Practice, 2e, is ideal for...ISBN-13:9780132775069
4Security Program and PoliciesSari Greene2014-03-20Everything you need to know about information security progr...ISBN-13:0133481174
5Network Security Principles and PracticesSaadat Malik2003Expert solutions for securing network infrastructures and VP...ISBN-13:9781587050251
6Cryptography and Network SecurityISBN-13:9788182830271
7Security Policies and ProceduresSari Stern Greene2006Security Policies and Procedures: Principles and Practices (...ISBN-13:9780131866911
8Information Security IlluminatedMichael G. Solomon2009-10-07A comprehensive survey of the most current and critical info...ISBN-13:1449677916
9Secure CodingMark Graff2003The authors look at the problem of bad code in a new way. Pa...ISBN-13:9780596002428
10Principles and Practice of Information SecurityLinda Volonino2004This book provides professionals with the necessary manageri...UOM:39015057595376
11Principles of Information SecurityMichael E. Whitman2011-01-01The fourth edition of Principles of Information Security exp...ISBN-13:1111138214
12Principles of Information SecurityMichael E. Whitman2014-11-26Specifically oriented to the needs of information systems st...ISBN-13:1285448367
13Private SecurityCharles P. Nemeth2017-09-22There are few textbooks available that outline the foundatio...ISBN-13:1498723365
14Information Security Management PrinciplesAndy Taylor2013In today's technology-driven environment, there is an ever-i...ISBN-13:9781780171784
15INFORMATION SECURITYDHIREN R. PATEL2008-04-22This book offers a comprehensive introduction to the fundame...ISBN-13:9788120333512
16Computer and Cyber SecurityBrij B. Gupta2018-11-19This is a monumental reference for the theory and practice o...ISBN-13:0429756305
17Data PrivacyNataraj Venkataramanan2016-10-03The book covers data privacy in depth with respect to data m...ISBN-13:1315353768
18Computer and Information Security HandbookJohn R. Vacca2012-11-05The second edition of this comprehensive handbook of compute...ISBN-13:0123946123
19Machine Learning for Computer and Cyber SecurityBrij B. Gupta2019-02-05While Computer Security is a broader term which incorporates...ISBN-13:0429995725
20FISMA Principles and Best PracticesPatrick D. Howard2016-04-19While many agencies struggle to comply with Federal Informat...ISBN-13:1420078305
21Principles and Practices for a Federal Statistical AgencyNational Academies of Sciences, Engineering, and Medicine2017-08-27Publicly available statistics from government agencies that ...ISBN-13:0309461677
22Water SecurityBruce Lankford2013-10-15The purpose of this book is to present an overview of the la...ISBN-13:1136285865
23Principles of Information SecurityMichael E. Whitman2017-05-24Master the latest technology and developments from the field...ISBN-13:1337102067
24Network and internetwork securityWilliam Stallings1995Comprehensive in approach, this introduction to network and ...UOM:49015002337526
25How to Cheat at Managing Information SecurityMark Osborne2006-08-22This is the only book that covers all the topics that any bu...ISBN-13:9780080508283
26Management of Information SecurityMichael E. Whitman2016-03-22Readers discover a managerially-focused overview of informat...ISBN-13:130550125X
27Fundamentals of Information Systems SecurityDavid Kim2013-07-15PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SE...ISBN-13:1284031640
28Security+ Guide to Network Security FundamentalsMark Ciampa2012-07-27Reflecting the latest trends and developments from the infor...ISBN-13:1111640122
29Managing Information Security RisksChristopher J. Alberts2002This is a descriptive and process-oriented book on a new sec...ISBN-13:9780321118868
30Information Security GovernanceS.H. Solms2008-12-16IT Security governance is becoming an increasingly important...ISBN-13:0387799842
31Computers at RiskSystem Security Study Committee1990-01-15Computers at Risk presents a comprehensive agenda for develo...ISBN-13:0309574609
32MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICEDeven N. Shah2009-07-01Special Features: "Includes a new chapter on network securit...ISBN-13:9788126519873
33Physical Security2015ISBN-13:9781934904619
34The Basics of Information SecurityJason Andress2014-05-20As part of the Syngress Basics series, The Basics of Informa...ISBN-13:0128008121
35Information Security Best PracticesGeorge L Stefanek2002-04-19Protecting computer networks and their client computers agai...ISBN-13:9780080491547
36Elementary Information SecurityRichard E. Smith2011-11-18Elementary Information Security is certified to comply fully...ISBN-13:0763761419
37Cybersecurity for the Home and OfficeJohn Bandler2018-09-07Cybersecurity for the Home and Office: The Lawyer's Guide to...ISBN-13:9781634259071
38Security ManagementJacques A. Cazemier1999For information technology (IT), information is the coreof i...ISBN-13:9780113300143
39Programming in CStephen G. Kochan2004-07-08Learn the C programming language from one of the best. Steph...ISBN-13:0672331411
40The Practice of Network Security MonitoringRichard Bejtlich2013-07-15Network security is not simply about building impenetrable w...ISBN-13:159327534X
Libris
1Information security : principles and practicesMerkow, Mark S.,2014Information security : principles and practices
2Information security : principles and practicesMerkow, Mark S.c2005Information security : principles and practices
3Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S2014Information Security: Principles and Practices [Elektronisk ...
4Network Security Principles and Practices [Elektronisk resur...Malik, Saadat2002Network Security Principles and Practices [Elektronisk resur...
5Planning optimal library spaces : principles, processes, and...Moore, David R., II, 1966-Planning optimal library spaces : principles, processes, and...
6Innovative Practices in Teaching Information Sciences and Te...Carroll, John M.Innovative Practices in Teaching Information Sciences and Te...
7"Information Security: Principles and Practices, Second Edit...Mark S. Merkow. Jim Breithaupt.2014"Information Security: Principles and Practices, Second Edit...
8Mobile inter-networking with IPv6 [Elektronisk resurs] conce...Koodli, Rajeev S., 1968-Mobile inter-networking with IPv6 [Elektronisk resurs] conce...
9Aviation Security, Privacy, Data Protection and Other Human ...Enerstvedt, Olga Mironenko.Aviation Security, Privacy, Data Protection and Other Human ...
10Privacy and Identity Management. Time for a Revolution? 10th...Privacy and Identity Management. Time for a Revolution? 10th...
11Business Information Systems Workshops [Elektronisk resurs] ...Abramowicz, Witold.Business Information Systems Workshops [Elektronisk resurs] ...
12Governance, risk, and compliance handbook : technology, fina...Governance, risk, and compliance handbook : technology, fina...
13Information Systems Management in the Big Data Era [Elektron...Lake, Peter.Information Systems Management in the Big Data Era [Elektron...
14Software Project Management for Distributed Computing Life-C...Software Project Management for Distributed Computing Life-C...
15Generally accepted principles and practices for securing inf...Swanson, Marianne1996Generally accepted principles and practices for securing inf...
16MobiLeak [Elektronisk resurs] Security and Privacy of Person...Stirparo, PasqualeMobiLeak [Elektronisk resurs] Security and Privacy of Person...
17Handbook of Fire and Explosion Protection Engineering Princi...Nolan, Dennis P.Handbook of Fire and Explosion Protection Engineering Princi...
18Open Enterprise Security Architecture (O-ESA) [Elektronisk r...Wahe, Sterfan.2011Open Enterprise Security Architecture (O-ESA) [Elektronisk r...
19Technology Enhanced Learning. Quality of Teaching and Educat...Lytras, Miltiadis D.Technology Enhanced Learning. Quality of Teaching and Educat...
20Developmental psychology : childhood and adolescenceShaffer, David R. 1946-Developmental psychology : childhood and adolescence
21Cyber-Risk ManagementRefsdal, Atle.Cyber-Risk Management
22National Association of Broadcasters engineering handbookNational Association of Broadcasters engineering handbook
23Approaches to Plant Stress and their Management [Elektronisk...Gaur, R.K.Approaches to Plant Stress and their Management [Elektronisk...
24Handbook of fire and explosion protection engineering princi...Nolan, Dennis PHandbook of fire and explosion protection engineering princi...
25Ethics and the politics of food : preprints of the 6th Congr...European Society for Agricultural and Food Ethics. Congress 2006 : Oslo, Norway)2006Ethics and the politics of food : preprints of the 6th Congr...
26How Clouds Hold IT Together Integrating Architecture with Cl...Waschke, Marvin.How Clouds Hold IT Together Integrating Architecture with Cl...
27Pro SQL Server on Microsoft AzureMazumdar, Pranab.Pro SQL Server on Microsoft Azure
28Operational risk management : best practices in the financia...Chapelle, ArianeOperational risk management : best practices in the financia...
29Secondary Liability of Internet Service ProvidersSecondary Liability of Internet Service Providers
30Practical Risk Management for the CIO [Elektronisk resurs]Scherling, Mark.Practical Risk Management for the CIO [Elektronisk resurs]
31Access to Education in Europe [Elektronisk resurs] A Framewo...Downes, Paul.Access to Education in Europe [Elektronisk resurs] A Framewo...
32The map reader [Elektronisk resurs] theories of mapping prac...The map reader [Elektronisk resurs] theories of mapping prac...
33Practical Hadoop Migration How to Integrate Your RDBMS with ...Lakhe, Bhushan.Practical Hadoop Migration How to Integrate Your RDBMS with ...
34Case Studies in Project, Program, and Organizational Project...Milosevic, Dragan Z.Case Studies in Project, Program, and Organizational Project...
35Impact of emerging digital technologies on leadership in glo...Impact of emerging digital technologies on leadership in glo...
36Laboratory safety for chemistry studentsHill, Robert H., 1945-2010Laboratory safety for chemistry students
37Detention of non-state actors engaged in hostilities : the f...Detention of non-state actors engaged in hostilities : the f...
38The United Nations Convention on the Rights of Persons with ...The United Nations Convention on the Rights of Persons with ...
39Research handbook on EU administrative law [Elektronisk resu...Research handbook on EU administrative law [Elektronisk resu...
SwePub
1Automated architecture modeling for enterprise technology ma...Välja, Margus, Korman, Matus, Lagerström, Robert, Franke, Ulrik, Automated architecture modeling for enterprise technology ma...
2MobiLeak Security and Privacy of Personal Data in Mobile App...Stirparo, Pasquale,2015MobiLeak Security and Privacy of Personal Data in Mobile App...
3Automated Architecture Modeling for Enterprise Technology Ma...Välja, Margus, 1981-, Korman, Matus, 1985-, Lagerström, Robert, 1981-, Franke, Ulrik, Automated Architecture Modeling for Enterprise Technology Ma...
4Charlatanry in forensic speech science : A problem to be tak...Eriksson, Anders, Lacerda, Francisco, Charlatanry in forensic speech science : A problem to be tak...
5Assessment of safety processes in requirements engineeringVilela, Jéssyka, Castro, Jaelson, Martins, Luiz Eduardo, Gorschek, Tony, 1972-, Assessment of safety processes in requirements engineering
6Protecting the Integrity of Digital Evidence and Basic Human...Saleem, Shahzad, 1977-,2015Protecting the Integrity of Digital Evidence and Basic Human...
7Legal Implications of Data Mining : Assessing the European U...Colonna, Liane, 1981-,2016Legal Implications of Data Mining : Assessing the European U...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 1.906.529 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 1.146 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2019 Illius Media