Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Information Security: Principles And PracticesMerkow2007-09This text has been developed to cover the 10 domains in the ...ISBN-13:9788131712887
2Computer Security: Principles and Practice PDF ebook, Global...William Stallings2015-01-26Computer Security: Principles and Practice, Third Edition, i...ISBN-13:1292066202
3Network Security Principles and PracticesSaadat Malik2003Expert solutions for securing network infrastructures and VP...ISBN-13:9781587050251
4Computer Security Principles and PracticeMr. Rohit Manglik2023-06-23Covers principles of cybersecurity, including encryption, au...ISBN-13:9366896812
5The Handbook of Information Security for Advanced Neuroprost...Matthew E. Gladden2017-02-20How does one ensure information security for a computer that...ISBN-13:1944373101
6Information SecurityMark Stamp2021-09-28Provides systematic guidance on meeting the information secu...ISBN-13:1119505909
7FUNDAMENTAL OF CYBER SECURITYMayank Bhusan/Rajkumar Singh Rathore/Aatif Jamshed2020-07-06Description-The book has been written in such a way that the...ISBN-13:9386551551
8Information Technology Control and Audit, Fourth EditionSandra Senft2012-07-18The new edition of a bestseller, Information Technology Cont...ISBN-13:1439893209
9Computer SecurityWilliam Stallings2012"The objective of this book is to provide an up-to-date surv...ISBN-13:9780132775069
10Information Security Management Handbook, Sixth EditionHarold F. Tipton2007-05-14Considered the gold-standard reference on information securi...ISBN-13:0849374952
11Information Security ManagementMichael Workman2021-10-29Revised edition of: Information security for managers.ISBN-13:1284211657
12The CISSP Prep GuideRonald L. Krutz2004-04-12This updated bestseller features new, more focused review ma...ISBN-13:0764571818
13Network Security GuidebookPeter Johnson2024-09-18"Network Security Guidebook: Protocols and Techniques" is an...PKEY:6610000641314
14Auditing Information and Cyber Security GovernanceRobert E. Davis2021-09-22"A much-needed service for society today. I hope this book r...ISBN-13:1000416089
15A Blueprint for Implementing Best Practice Procedures in a D...David Lilburn Watson2023-11-09Digital Forensic Processing and Procedures: Meeting the Requ...ISBN-13:0128194804
16Breaking Into Cybersecurity: A Comprehensive Guide to Launch...Sunday Bitrus2023-07-20"Breaking Into Cybersecurity: A Comprehensive Guide to Launc...
17COBIT 5 for Information SecurityISACA2012COBIT 5 provides a comprehensive framework that assists ente...ISBN-13:1604202548
18Cybersecurity Architect's HandbookLester Nichols2024-03-29Discover the ins and outs of cybersecurity architecture with...ISBN-13:1803239891
19Computer Security Fundamentals + Information SecurityMark Merkow2007-07-02This package contains the following components: -0131711296:...ISBN-13:9780131593664
20Encyclopedia of Information Assurance - 4 Volume Set (Print)...Rebecca Herold2010-12-22Charged with ensuring the confidentiality, integrity, availa...ISBN-13:1351235796
21Study Guide to ISO 27001 Compliance2024-10-26Designed for professionals, students, and enthusiasts alike,...ISBN-13:1836796331
22Bridging Academia and Industry Through Cloud Integration in ...Mahalle, Parikshit N.2025-02-05Bridging academia and industry through cloud integration in ...9798369367070
23Statistical Techniques for Network Security: Modern Statisti...Wang, Yun2008-10-31Provides statistical modeling and simulating approaches to a...ISBN-13:1599047101
24Information Security: Principles and PracticesMiles Carr2017-04-18This book elucidates the concepts and innovative models arou...ISBN-13:9781635491517
25Advances in Cyber Security: Principles, Techniques, and Appl...Kuan-Ching Li2018-12-06This book provides state-of-the-art coverage of the principl...ISBN-13:9811314837
26Information Technology Applications in Industry IIPrasad Yarlagadda2013-09-03Selected, peer reviewed papers from the 2013 2nd Internation...ISBN-13:3038262455
27Network Security BibleEric Cole2004-12-20A must for working network and security professionals as wel...ISBN-13:0764589156
28Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®Susan Hansche2005-09-29The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® pro...ISBN-13:142003135X
29Human Aspects of Information Security and AssuranceSteven Furnell2021-07-07This book constitutes the proceedings of the 15th IFIP WG 11...ISBN-13:3030811115
30Cryptography And Network Security Principles And PracticesWilliam Stallings2002ISBN-13:9788178086057
31Toward Corporate IT Standardization Management: Frameworks a...van Wessel, Robert2010-02-28"Given the limitations and uncertainties in the field of IT ...ISBN-13:1615207600
32CyberWar, CyberTerror, CyberCrime and CyberActivismJulie Mehan2014-05-08This book encourages cybersecurity professionals to take a w...ISBN-13:1849285713
33Cybersecurity TodayDebrupa Palit2024-11-06DESCRIPTION This book comprehensively covers essential topic...ISBN-13:9365893755
34Information Security Theory and PracticeOlivier Blazy2019-05-11This volume constitutes the refereed proceedings of the 12th...ISBN-13:3030200744
35Cryptography and Network SecurityWilliam Stallings2006In this age of viruses and hackers, of electronic eavesdropp...ISBN-13:0131873164
36Federal Cloud ComputingMatthew Metheny2017-01-05Federal Cloud Computing: The Definitive Guide for Cloud Serv...ISBN-13:012809687X
37Handbook of Research on Intrusion Detection SystemsGupta, Brij B.2020-02-07Businesses in today’s world are adopting technology-enable...ISBN-13:1799822435
38MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICEDeven N. Shah2009-07-01Special Features: "Includes a new chapter on network securit...ISBN-13:9788126519873
39Executive's Guide to IT GovernanceRobert R. Moeller2013-01-29Create strong IT governance processes In the current busines...ISBN-13:1118238931
40Vanans maktCharles Duhigg2013-12-10Vill du komma igång med träningen, bli mer effektiv, lanse...ISBN-13:9127135268
Libris
1Information security : principles and practicesMerkow, Mark S.ArrayInformation security : principles and practices
2Information security : principles and practicesMerkow, Mark S.c2005Information security : principles and practices
3Information Security Handbook. [Elektronisk resurs] : Enhanc...Death, DarrenArrayInformation Security Handbook. [Elektronisk resurs] : Enhanc...
4Information Security : Principles and Practices [Elektronisk...Merkow, Mark.uuuu-uuuuInformation Security : Principles and Practices [Elektronisk...
5Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S.uuuu-uuuuInformation Security: Principles and Practices [Elektronisk ...
6Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S2014Information Security: Principles and Practices [Elektronisk ...
7Network Security Principles and Practices [Elektronisk resur...Malik, Saadat2002Network Security Principles and Practices [Elektronisk resur...
8Planning optimal library spaces : principles, processes, and...Moore, David R., II, 1966-ArrayPlanning optimal library spaces : principles, processes, and...
9Bring Your Own Device Security Policy Compliance Framework [...Palanisamy, Rathika.2025Bring Your Own Device Security Policy Compliance Framework [...
10Innovative Practices in Teaching Information Sciences and Te...Carroll, John M.2014Innovative Practices in Teaching Information Sciences and Te...
11"Information Security: Principles and Practices, Second Edit...Mark S. Merkow. Jim Breithaupt.2014"Information Security: Principles and Practices, Second Edit...
12Aviation Security, Privacy, Data Protection and Other Human ...Enerstvedt, Olga Mironenko.2017Aviation Security, Privacy, Data Protection and Other Human ...
13Data Privacy and Crowdsourcing [Elektronisk resurs] A Compar...Hornuf, Lars.2023Data Privacy and Crowdsourcing [Elektronisk resurs] A Compar...
14Mobile inter-networking with IPv6 [Elektronisk resurs] conce...Koodli, Rajeev S., 1968-c2007Mobile inter-networking with IPv6 [Elektronisk resurs] conce...
15Computerization and controversy : value conflicts and social...cop. 1996Computerization and controversy : value conflicts and social...
16Privacy and Identity Management. Time for a Revolution? 10th...2016Privacy and Identity Management. Time for a Revolution? 10th...
17The DevOps handbook : how to create world-class agility, rel...Kim, GeneArrayThe DevOps handbook : how to create world-class agility, rel...
18Microsoft 365 Security, Compliance, and Identity Administrat...Rising, PeterArrayMicrosoft 365 Security, Compliance, and Identity Administrat...
19Business Information Systems Workshops [Elektronisk resurs] ...Abramowicz, Witold.2014Business Information Systems Workshops [Elektronisk resurs] ...
20Generally accepted principles and practices for securing inf...Swanson, Marianne1996Generally accepted principles and practices for securing inf...
21Data governance and policy in Africa2023Data governance and policy in Africa
22Governance, risk, and compliance handbook : technology, fina...c2008Governance, risk, and compliance handbook : technology, fina...
23Implementing DevSecOps Practices. [Elektronisk resurs] : Sup...Sehgal, Vandana VermaArrayImplementing DevSecOps Practices. [Elektronisk resurs] : Sup...
24South African Institute of Computer Scientists and Informati...Gerber, Aurona.2023South African Institute of Computer Scientists and Informati...
25Information security : principles and practices / Mark S. Me...Merkow, Mark S.uuuu-uuuuInformation security : principles and practices / Mark S. Me...
26From trustworthy AI principles to public procurement practic...Hickok, MerveArrayFrom trustworthy AI principles to public procurement practic...
27Context-Based Micro-Training [Elektronisk resurs] Enhancing ...Kävrestad, Joakim, 1989-2022Context-Based Micro-Training [Elektronisk resurs] Enhancing ...
28Technology and Religious Tourism. [Elektronisk resurs] : Eme...Tyagi, Pankaj Kumar.ArrayTechnology and Religious Tourism. [Elektronisk resurs] : Eme...
29Information Systems Management in the Big Data Era [Elektron...Lake, Peter.2014Information Systems Management in the Big Data Era [Elektron...
30Software Project Management for Distributed Computing Life-C...2017Software Project Management for Distributed Computing Life-C...
31Food and Nutrition Security in the Kingdom of Saudi Arabia, ...Ahmed, Adam E.ArrayFood and Nutrition Security in the Kingdom of Saudi Arabia, ...
32Machine Learning Security with Azure. [Elektronisk resurs] :...Kalyva, GeorgiaArrayMachine Learning Security with Azure. [Elektronisk resurs] :...
33Cybersecurity Teaching in Higher Education [Elektronisk resu...2023Cybersecurity Teaching in Higher Education [Elektronisk resu...
34MobiLeak [Elektronisk resurs] Security and Privacy of Person...Stirparo, Pasquale2015MobiLeak [Elektronisk resurs] Security and Privacy of Person...
35Handbook of Fire and Explosion Protection Engineering Princi...Nolan, Dennis P.2010Handbook of Fire and Explosion Protection Engineering Princi...
36Context-Based Micro-Training [Elektronisk resurs] Enhancing ...Kävrestad, Joakim, 1989-2022Context-Based Micro-Training [Elektronisk resurs] Enhancing ...
37Information security [electronic resource] : principles and ...Merkow, Mark S.uuuu-uuuuInformation security [electronic resource] : principles and ...
38Technology Enhanced Learning. Quality of Teaching and Educat...Lytras, Miltiadis D.ArrayTechnology Enhanced Learning. Quality of Teaching and Educat...
39Agile estimating and planning. [Elektronisk resurs] : managi...2024Agile estimating and planning. [Elektronisk resurs] : managi...
40Biomedical Robots and Devices in Healthcare. [Elektronisk re...Iqbal, Faiz.ArrayBiomedical Robots and Devices in Healthcare. [Elektronisk re...
SwePub
1Developing an information classification methodBergström, Erik, 1976- Karlsson, Fredrik, 1974- Åhlfeldt, Rose-Mharie, 1960- Developing an information classification method
2Context-Based Micro-Training : Enhancing cybersecurity train...Kävrestad, Joakim, 1989- Nohlberg, Marcus, 1976- Furnell, Steven Åhlfeldt, Rose-Mharie, 1960- Context-Based Micro-Training : Enhancing cybersecurity train...
3MobiLeak : Security and Privacy of Personal Data in Mobile A...Stirparo, Pasquale Muftic, Sead, Professor Furnell, Steven Marcus, Professor MobiLeak : Security and Privacy of Personal Data in Mobile A...
4Automated architecture modeling for enterprise technology ma...Välja, Margus, 1981- Korman, Matus, 1985- Lagerström, Robert, 1981- Franke, Ulrik Automated architecture modeling for enterprise technology ma...
5Charlatanry in forensic speech science : A problem to be tak...Eriksson, Anders Lacerda, Francisco Charlatanry in forensic speech science : A problem to be tak...
6Assessment of safety processes in requirements engineeringVilela, Jéssyka Castro, Jaelson Martins, Luiz Eduardo Gorschek, Tony, 1972- Assessment of safety processes in requirements engineering
7Don't Patch the Researcher, Patch the Game : A Systematic Ap...Dirksen, Alexandra Giessler, Sebastian Erz, Hendrik, 1990- Johns, Martin Don't Patch the Researcher, Patch the Game : A Systematic Ap...
8Automating Data Extraction from Semi-Structured Industrial D...Möller, T. Singh, I. Bucaioni, Alessio, 1987- Cicchetti, Antonio Automating Data Extraction from Semi-Structured Industrial D...
9Protecting the Integrity of Digital Evidence and Basic Human...Saleem, Shahzad, 1977- Popov, Oliver, Professor Foukia, Noria Protecting the Integrity of Digital Evidence and Basic Human...
10The Perspective of Agile Software Developers on Data Privacy...Peixoto, Mariana Gorschek, Tony, 1972- Mendez, Daniel Silva, Carla The Perspective of Agile Software Developers on Data Privacy...
11Legal Implications of Data Mining : Assessing the European U...Colonna, Liane, 1981- Magnusson Sjöberg, Cecilia, Professor Bakardjieva-Engelbrekt, Antonina, Professor Svantesson, Dan, Professor Legal Implications of Data Mining : Assessing the European U...
12Food Aid Technology : The Experience of a Syrian Refugee Com...Talhouk, Reem Refaat Coles-Kemp, Lizzie Jensen, Rikke Bjerg Balaam, Madeline Food Aid Technology : The Experience of a Syrian Refugee Com...
13A Global Perspective on Phosphorus Management Decision Suppo...Djodjic, Faruk Mellander, Per-Erik A Global Perspective on Phosphorus Management Decision Suppo...
14A growing concern : Online access to minors’ health record...Hagström, Josefin, 1990- Hägglund, Maria, Docent, 1975- Blease, Charlotte, Docent Scandurra, Isabella, PhD A growing concern : Online access to minors’ health record...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 4.590.051 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 3 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2025 Illius Media