Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Information SecurityMark S. Merkow2014Information Security: Principles and Practices, Second Editi...ISBN-13:0789753251
2Information SecurityMark Stamp2005-11-11Your expert guide to information security As businesses and ...ISBN-13:0471744182
3Information SecurityMark Stamp2011-11-08Now updated—your expert guide to twenty-first century info...ISBN-13:9781118027967
4Principles and Practice of Information SecurityLinda Volonino2004This book provides professionals with the necessary manageri...UOM:39015057595376
5Computer SecurityWilliam Stallings2012Computer Security: Principles and Practice, 2e, is ideal for...ISBN-13:9780132775069
6Principles of Information SecurityMichael E. Whitman2014-11-26Specifically oriented to the needs of information systems st...ISBN-13:1305176731
7Network Security Principles and PracticesSaadat Malik2003Expert solutions for securing network infrastructures and VP...ISBN-13:9781587050251
8Cryptography and Network SecurityWilliam Stallings2006This text provides a practical survey of both the principles...ISBN-13:0131873164
9The InfoSec HandbookUmesha Nayak2014-09-17The InfoSec Handbook offers the reader an organized layout o...ISBN-13:1430263830
10Secure CodingMark Graff2003The authors look at the problem of bad code in a new way. Pa...ISBN-13:9780596002428
11Strategic Information SecurityJohn Wylder2003-11-24The new emphasis on physical security resulting from the ter...ISBN-13:9780203497081
12Security Policies and ProceduresSari Stern Greene2006Security Policies and Procedures: Principles and Practices (...ISBN-13:9780131866911
13Security Program and PoliciesSari Stern Greene2014Everything you need to know about information security progr...ISBN-13:0789751674
14Computer and Cyber SecurityBrij B. Gupta2018-11-19This is a monumental reference for the theory and practice o...ISBN-13:0429756305
15Private SecurityCharles P. Nemeth2017-09-22There are few textbooks available that outline the foundatio...ISBN-13:1498723365
16Modern Principles, Practices, and Algorithms for Cloud Secur...Gupta, Brij B.2019-09-27In today’s modern age of information, new technologies are...ISBN-13:1799810844
17Machine Learning for Computer and Cyber SecurityBrij B. Gupta2019-02-05While Computer Security is a broader term which incorporates...ISBN-13:0429995717
18Fundamentals of Cyber SecurityMayank Bhushan2017-01-01Description-The book has been written in such a way that the...ISBN-13:9386551551
19Water SecurityBruce Lankford2013-10-15The purpose of this book is to present an overview of the la...ISBN-13:1136285865
20Computers at RiskNational Research Council1990-02-01Computers at Risk presents a comprehensive agenda for develo...ISBN-13:0309043883
21Information Security and Ethics: Concepts, Methodologies, To...Nemati, Hamid2007-09-30Presents theories and models associated with information pri...ISBN-13:1599049384
22Internet of Things SecurityBrij B. Gupta2020-02-24The Internet of Things (IoT), with its technological advance...ISBN-13:1000048454
23FISMA Principles and Best PracticesPatrick D. Howard2016-04-19While many agencies struggle to comply with Federal Informat...ISBN-13:1420078305
24Principles of Computer System DesignJerome H. Saltzer2009-05-21Principles of Computer System Design is the first textbook t...ISBN-13:9780080959429
25Computer SecurityWilliam Stallings2018For courses in computer/network security Balancing principle...ISBN-13:9780134794105
26Fundamentals of Information Systems SecurityDavid Kim2010-11-17PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEM...ISBN-13:1449629466
27Security+ Guide to Network Security FundamentalsMark Ciampa2012-07-27Reflecting the latest trends and developments from the infor...ISBN-13:1133708005
28Network and Internetwork SecurityWilliam Stallings1995Comprehensive in approach, this introduction to network and ...UOM:49015002337526
29Introduction to Network SecurityJie Wang2015-07-10Introductory textbook in the important area of network secur...ISBN-13:1118939506
30Handbook of Computer Networks and Cyber SecurityBrij B. Gupta2019-12-31This handbook introduces the basic principles and fundamenta...ISBN-13:3030222772
31MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICEDeven N. Shah2009-07-01Special Features: "Includes a new chapter on network securit...ISBN-13:9788126519873
32Computer SecurityMatt Bishop2003The importance of computer security has increased dramatical...ISBN-13:9780201440997
33Security ScienceClifton Smith2012-12-31Security Science integrates the multi-disciplined practice a...ISBN-13:0123947855
34IT Auditing: Using Controls to Protect Information AssetsChris Davis2007-01-12Protect Your Systems with Proven IT Auditing Strategies "A m...ISBN-13:0071631763
35Information Security Management PrinciplesAndy Taylor2013In todayOCOs technology-driven environment, there is an ever...ISBN-13:9781780171760
36Building a Secure Computer SystemMorrie Gasser1988Little prior knowledge is needed to use this long-needed ref...UOM:39015012765395
37European 'Security' GovernanceGeorge Christou2014-06-11This book argues that we can understand and explain the EU a...ISBN-13:1317977939
38Guide to Network SecurityMichael E. Whitman2012-09-20GUIDE TO NETWORK SECURITY is a wide-ranging new text that pr...ISBN-13:1285414861
39Information Security Policies, Procedures, and StandardsThomas R. Peltier2016-04-19By definition, information security exists to protect your o...ISBN-13:9780849390326
40Threat ModelingIzar Tarandach2020-11-13Threat modeling is one of the most essential--and most misun...ISBN-13:1492056502
Libris
1Information security : principles and practicesMerkow, Mark S.,ArrayInformation security : principles and practices
2Information security : principles and practicesMerkow, Mark S.c2005Information security : principles and practices
3Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S2014Information Security: Principles and Practices [Elektronisk ...
4Network Security Principles and Practices [Elektronisk resur...Malik, Saadat2002Network Security Principles and Practices [Elektronisk resur...
5Planning optimal library spaces : principles, processes, and...Moore, David R., II, 1966-ArrayPlanning optimal library spaces : principles, processes, and...
6Innovative Practices in Teaching Information Sciences and Te...Carroll, John M.2014Innovative Practices in Teaching Information Sciences and Te...
7"Information Security: Principles and Practices, Second Edit...Mark S. Merkow. Jim Breithaupt.2014"Information Security: Principles and Practices, Second Edit...
8Mobile inter-networking with IPv6 [Elektronisk resurs] conce...Koodli, Rajeev S., 1968-c2007Mobile inter-networking with IPv6 [Elektronisk resurs] conce...
9Aviation Security, Privacy, Data Protection and Other Human ...Enerstvedt, Olga Mironenko.2017Aviation Security, Privacy, Data Protection and Other Human ...
10Privacy and Identity Management. Time for a Revolution? 10th...2016Privacy and Identity Management. Time for a Revolution? 10th...
11The DevOps handbook : how to create world-class agility, rel...Kim, GeneArrayThe DevOps handbook : how to create world-class agility, rel...
12Generally accepted principles and practices for securing inf...Swanson, Marianne1996Generally accepted principles and practices for securing inf...
13Business Information Systems Workshops [Elektronisk resurs] ...Abramowicz, Witold.2014Business Information Systems Workshops [Elektronisk resurs] ...
14Governance, risk, and compliance handbook : technology, fina...c2008Governance, risk, and compliance handbook : technology, fina...
15Information Systems Management in the Big Data Era [Elektron...Lake, Peter.2014Information Systems Management in the Big Data Era [Elektron...
16Software Project Management for Distributed Computing Life-C...2017Software Project Management for Distributed Computing Life-C...
17MobiLeak [Elektronisk resurs] Security and Privacy of Person...Stirparo, Pasquale2015MobiLeak [Elektronisk resurs] Security and Privacy of Person...
18Handbook of Fire and Explosion Protection Engineering Princi...Nolan, Dennis P.2010Handbook of Fire and Explosion Protection Engineering Princi...
19Information security [electronic resource] : principles and ...Merkow, Mark S.uuuu-uuuuInformation security [electronic resource] : principles and ...
20Open Enterprise Security Architecture (O-ESA) [Elektronisk r...Wahe, Sterfan.2011Open Enterprise Security Architecture (O-ESA) [Elektronisk r...
21Technology Enhanced Learning. Quality of Teaching and Educat...Lytras, Miltiadis D.ArrayTechnology Enhanced Learning. Quality of Teaching and Educat...
22Developmental psychology : childhood and adolescenceShaffer, David R. 1946-[2014]Developmental psychology : childhood and adolescence
23Cyber-Risk ManagementRefsdal, Atle.2015Cyber-Risk Management
24National Association of Broadcasters engineering handbook2018National Association of Broadcasters engineering handbook
25Handbook of fire and explosion protection engineering princi...Nolan, Dennis P1996Handbook of fire and explosion protection engineering princi...
26Ethics and the politics of food : preprints of the 6th Congr...European Society for Agricultural and Food Ethics. Congress 2006 : Oslo, Norway)2006Ethics and the politics of food : preprints of the 6th Congr...
27Approaches to Plant Stress and their Management [Elektronisk...Gaur, R.K.2014Approaches to Plant Stress and their Management [Elektronisk...
28South-south cooperation and Chinese foreign aidArraySouth-south cooperation and Chinese foreign aid
29The map reader [Elektronisk resurs] theories of mapping prac...2011The map reader [Elektronisk resurs] theories of mapping prac...
30Operational risk management : best practices in the financia...Chapelle, ArianeArrayOperational risk management : best practices in the financia...
31Secondary Liability of Internet Service Providers2017Secondary Liability of Internet Service Providers
32How Clouds Hold IT Together Integrating Architecture with Cl...Waschke, Marvin.2015How Clouds Hold IT Together Integrating Architecture with Cl...
33Practical Risk Management for the CIO [Elektronisk resurs]Scherling, Mark.2011Practical Risk Management for the CIO [Elektronisk resurs]
34Pro SQL Server on Microsoft AzureMazumdar, Pranab.2016Pro SQL Server on Microsoft Azure
35Access to Education in Europe [Elektronisk resurs] A Framewo...Downes, Paul.2014Access to Education in Europe [Elektronisk resurs] A Framewo...
36Redefining diversity and dynamics of natural resources manag...[2017]Redefining diversity and dynamics of natural resources manag...
37The Mueller Report2019The Mueller Report
38Case Studies in Project, Program, and Organizational Project...Milosevic, Dragan Z.2011Case Studies in Project, Program, and Organizational Project...
39Impact of emerging digital technologies on leadership in glo...2014Impact of emerging digital technologies on leadership in glo...
40Practical Hadoop Migration How to Integrate Your RDBMS with ...Lakhe, Bhushan.2016Practical Hadoop Migration How to Integrate Your RDBMS with ...
SwePub
1Developing an information classification methodBergström, Erik, 1976- Karlsson, Fredrik Åhlfeldt, Rose-Mharie, 1960- Karlsson, F. Developing an information classification method
2Charlatanry in forensic speech science : A problem to be tak...Eriksson, Anders Lacerda, Francisco Charlatanry in forensic speech science : A problem to be tak...
3MobiLeak : Security and Privacy of Personal Data in Mobile A...Stirparo, Pasquale Muftic, Sead, Professor Furnell, Steven Marcus, Professor MobiLeak : Security and Privacy of Personal Data in Mobile A...
4Automated architecture modeling for enterprise technology ma...Välja, Margus Korman, Matus Lagerström, Robert Franke, Ulrik Automated architecture modeling for enterprise technology ma...
5Assessment of safety processes in requirements engineeringVilela, Jéssyka Castro, Jaelson Martins, Luiz Eduardo Gorschek, Tony, 1972- Assessment of safety processes in requirements engineering
6Automated Architecture Modeling for Enterprise Technology Ma...Välja, Margus, 1981- Korman, Matus, 1985- Lagerström, Robert, 1981- Franke, Ulrik Automated Architecture Modeling for Enterprise Technology Ma...
7Charlatanry in for forensic speech science: A problem to be ...Eriksson, Anders, 1939 Lacerda, Francisco Charlatanry in for forensic speech science: A problem to be ...
8Protecting the Integrity of Digital Evidence and Basic Human...Saleem, Shahzad, 1977- Popov, Oliver, Professor Foukia, Noria Protecting the Integrity of Digital Evidence and Basic Human...
9Food Aid Technology : The Experience of a Syrian Refugee Com...Talhouk, Reem Refaat Coles-Kemp, Lizzie Jensen, Rikke Bjerg Balaam, Madeline Food Aid Technology : The Experience of a Syrian Refugee Com...
10Legal Implications of Data Mining : Assessing the European U...Colonna, Liane, 1981- Magnusson Sjöberg, Cecilia, Professor Bakardjieva-Engelbrekt, Antonina, Professor Svantesson, Dan, Professor Legal Implications of Data Mining : Assessing the European U...
11A Global Perspective on Phosphorus Management Decision Suppo...Djodjic, Faruk Mellander, Per-Erik A Global Perspective on Phosphorus Management Decision Suppo...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 3.049.965 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 405 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2021 Illius Media