Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Information SecurityMark S. Merkow2014Information Security: Principles and Practices, Second Editi...ISBN-13:0789753251
2Information SecurityMark Stamp2011-11-08Now updated—your expert guide to twenty-first century info...ISBN-13:9781118027967
3Computer SecurityWilliam Stallings2014-10-10Computer Security: Principles and Practice, Third Edition, i...ISBN-13:9781292066172
4Network Security Principles and PracticesSaadat Malik2003Expert solutions for securing network infrastructures and VP...ISBN-13:9781587050251
5Security Program and PoliciesSari Greene2014-03-20Everything you need to know about information security progr...ISBN-13:0133481174
6Principles of Information SecurityMichael E. Whitman2017-05-24Master the latest technology and developments from the field...ISBN-13:1337102067
7Principles and Practice of Information SecurityLinda Volonino2004This book provides professionals with the necessary manageri...UOM:39015057595376
8Cryptography and Network SecurityWilliam Stallings2006This text provides a practical survey of both the principles...ISBN-13:0131873164
9Applied Information SecurityDavid Basin2011-10-27This book explores fundamental principles for securing IT sy...ISBN-13:3642244742
10Secure CodingMark Graff2003The authors look at the problem of bad code in a new way. Pa...ISBN-13:9780596002428
11Security Policies and ProceduresSari Stern Greene2006Security Policies and Procedures: Principles and Practices (...ISBN-13:9780131866911
12Information Security IlluminatedMichael G. Solomon2009-10-07A comprehensive survey of the most current and critical info...ISBN-13:1449677916
13The InfoSec HandbookUmesha Nayak2014-09-17The InfoSec Handbook offers the reader an organized layout o...ISBN-13:1430263830
14Information Security Management PrinciplesAndy Taylor2013In today's technology-driven environment, there is an ever-i...ISBN-13:9781780171784
15Computer and Cyber SecurityBrij B. Gupta2018-11-19This is a monumental reference for the theory and practice o...ISBN-13:0429756305
16INFORMATION SECURITYDHIREN R. PATEL2008-04-22This book offers a comprehensive introduction to the fundame...ISBN-13:9788120333512
17Computer and Information Security HandbookJohn R. Vacca2017-05-10Computer and Information Security Handbook, Third Edition, p...ISBN-13:0128039299
18FISMA Principles and Best PracticesPatrick D. Howard2016-04-19While many agencies struggle to comply with Federal Informat...ISBN-13:1420078305
19Private SecurityCharles P. Nemeth2017-09-22There are few textbooks available that outline the foundatio...ISBN-13:1498723365
20Network Security BibleEric Cole2005-01-03A must for working network and security professionals as wel...ISBN-13:0764589156
21Information Security Management Handbook, Sixth EditionHarold F. Tipton2007-05-14Considered the gold-standard reference on information securi...ISBN-13:0849374952
22Water SecurityBruce Lankford2013-10-15The purpose of this book is to present an overview of the la...ISBN-13:1136285865
23How to Cheat at Managing Information SecurityMark Osborne2006-08-22This is the only book that covers all the topics that any bu...ISBN-13:9780080508283
24Information Security HandbookDarren Death2017-12-08Implement information security effectively as per your organ...ISBN-13:1788473264
25Fixing Broken WindowsGeorge L. Kelling1997Cites successful examples of community-based policingISBN-13:0684837382
26Management of Information SecurityMichael E. Whitman2016-03-22Readers discover a managerially-focused overview of informat...ISBN-13:130550125X
27Fundamentals of Information Systems SecurityKim2016-10-15Revised and updated with the latest data in the field, Funda...ISBN-13:1284128237
28The Business Model for Information SecurityISACA2010-01-01ISBN-13:1604201541
29Managing Risk and Information SecurityMalcolm W. Harkins2016-08-11Examine the evolving enterprise security landscape and disco...ISBN-13:1484214552
30Network and internetwork securityWilliam Stallings1995Comprehensive in approach, this introduction to network and ...UOM:49015002337526
31MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICEDeven N. Shah2009-07-01Special Features: "Includes a new chapter on network securit...ISBN-13:9788126519873
32Introduction to Health Information Privacy and SecurityLaurie A. Rinehart-Thompson2013-01-01ISBN-13:9781584263531
33Managing Information Security RisksChristopher J. Alberts2002This is a descriptive and process-oriented book on a new sec...ISBN-13:9780321118868
34Introduction to Computer SecurityMichael Goodrich2014-02-10Introduction to Computer Security is appropriateforuse in co...ISBN-13:9780133575477
35Hands-On Information Security Lab ManualMichael E. Whitman2014-02-24HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, he...ISBN-13:1285167570
36Security+ Guide to Network Security FundamentalsMark Ciampa2012-07-27Reflecting the latest trends and developments from the infor...ISBN-13:1111640122
37Homeland SecurityCharles P. Nemeth2016-04-19Homeland security is a massive enterprise that gets larger b...ISBN-13:1466510919
38Principles and Practices for a Federal Statistical AgencyNational Research Council2009-03-13Since 1992, the Committee on National Statistics (CNSTAT) ha...ISBN-13:9780309164320
39Agile Information SecurityJames R. Fitzer2015-06-22In Agile Information Security, James Fitzer provides sound g...ISBN-13:1483556182
40Information Security Best PracticesGeorge L Stefanek2002-04-19Protecting computer networks and their client computers agai...ISBN-13:9780080491547
Libris
1Information security : principles and practicesMerkow, Mark S.,2014Information security : principles and practices
2Information security : principles and practicesMerkow, Mark S.c2005Information security : principles and practices
3Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S2014Information Security: Principles and Practices [Elektronisk ...
4Network Security Principles and Practices [Elektronisk resur...Malik, Saadat2002Network Security Principles and Practices [Elektronisk resur...
5Planning optimal library spaces : principles, processes, and...Moore, David R., II, 1966-Planning optimal library spaces : principles, processes, and...
6Innovative Practices in Teaching Information Sciences and Te...Carroll, John M.Innovative Practices in Teaching Information Sciences and Te...
7"Information Security: Principles and Practices, Second Edit...Mark S. Merkow. Jim Breithaupt.2014"Information Security: Principles and Practices, Second Edit...
8Mobile inter-networking with IPv6 [Elektronisk resurs] conce...Koodli, Rajeev S., 1968-Mobile inter-networking with IPv6 [Elektronisk resurs] conce...
9Aviation Security, Privacy, Data Protection and Other Human ...Enerstvedt, Olga Mironenko.Aviation Security, Privacy, Data Protection and Other Human ...
10Privacy and Identity Management. Time for a Revolution? 10th...Privacy and Identity Management. Time for a Revolution? 10th...
11Business Information Systems Workshops [Elektronisk resurs] ...Abramowicz, Witold.Business Information Systems Workshops [Elektronisk resurs] ...
12Governance, risk, and compliance handbook : technology, fina...Governance, risk, and compliance handbook : technology, fina...
13Information Systems Management in the Big Data Era [Elektron...Lake, Peter.Information Systems Management in the Big Data Era [Elektron...
14Software Project Management for Distributed Computing Life-C...Software Project Management for Distributed Computing Life-C...
15Generally accepted principles and practices for securing inf...Swanson, Marianne1996Generally accepted principles and practices for securing inf...
16MobiLeak [Elektronisk resurs] Security and Privacy of Person...Stirparo, PasqualeMobiLeak [Elektronisk resurs] Security and Privacy of Person...
17Handbook of Fire and Explosion Protection Engineering Princi...Nolan, Dennis P.Handbook of Fire and Explosion Protection Engineering Princi...
18Open Enterprise Security Architecture (O-ESA) [Elektronisk r...Wahe, Sterfan.2011Open Enterprise Security Architecture (O-ESA) [Elektronisk r...
19Technology Enhanced Learning. Quality of Teaching and Educat...Lytras, Miltiadis D.Technology Enhanced Learning. Quality of Teaching and Educat...
20Developmental psychology : childhood and adolescenceShaffer, David R. 1946-Developmental psychology : childhood and adolescence
21Cyber-Risk ManagementRefsdal, Atle.Cyber-Risk Management
22National Association of Broadcasters engineering handbookNational Association of Broadcasters engineering handbook
23Approaches to Plant Stress and their Management [Elektronisk...Gaur, R.K.Approaches to Plant Stress and their Management [Elektronisk...
24Handbook of fire and explosion protection engineering princi...Nolan, Dennis PHandbook of fire and explosion protection engineering princi...
25Ethics and the politics of food : preprints of the 6th Congr...European Society for Agricultural and Food Ethics. Congress 2006 : Oslo, Norway)2006Ethics and the politics of food : preprints of the 6th Congr...
26Secondary Liability of Internet Service ProvidersSecondary Liability of Internet Service Providers
27How Clouds Hold IT Together Integrating Architecture with Cl...Waschke, Marvin.How Clouds Hold IT Together Integrating Architecture with Cl...
28Practical Risk Management for the CIO [Elektronisk resurs]Scherling, Mark.Practical Risk Management for the CIO [Elektronisk resurs]
29Pro SQL Server on Microsoft AzureMazumdar, Pranab.Pro SQL Server on Microsoft Azure
30Access to Education in Europe [Elektronisk resurs] A Framewo...Downes, Paul.Access to Education in Europe [Elektronisk resurs] A Framewo...
31The map reader [Elektronisk resurs] theories of mapping prac...The map reader [Elektronisk resurs] theories of mapping prac...
32Case Studies in Project, Program, and Organizational Project...Milosevic, Dragan Z.Case Studies in Project, Program, and Organizational Project...
33Impact of emerging digital technologies on leadership in glo...Impact of emerging digital technologies on leadership in glo...
34Practical Hadoop Migration How to Integrate Your RDBMS with ...Lakhe, Bhushan.Practical Hadoop Migration How to Integrate Your RDBMS with ...
35Laboratory safety for chemistry studentsHill, Robert H., 1945-2010Laboratory safety for chemistry students
36Detention of non-state actors engaged in hostilities : the f...Detention of non-state actors engaged in hostilities : the f...
37The United Nations Convention on the Rights of Persons with ...The United Nations Convention on the Rights of Persons with ...
38Research handbook on EU administrative law [Elektronisk resu...Research handbook on EU administrative law [Elektronisk resu...
SwePub
1Automated architecture modeling for enterprise technology ma...Välja, M. Korman, M. Lagerström, R. Franke, Ulrik, Automated architecture modeling for enterprise technology ma...
2MobiLeak Security and Privacy of Personal Data in Mobile App...Stirparo, Pasquale,2015MobiLeak Security and Privacy of Personal Data in Mobile App...
3Charlatanry in forensic speech science : A problem to be tak...Eriksson, Anders, Lacerda, Francisco, Charlatanry in forensic speech science : A problem to be tak...
4Assessment of safety processes in requirements engineeringVilela, Jéssyka, Castro, Jaelson, Martins, Luiz Eduardo, Gorschek, Tony, 1972-, Assessment of safety processes in requirements engineering
5Protecting the Integrity of Digital Evidence and Basic Human...Saleem, Shahzad, 1977-,2015Protecting the Integrity of Digital Evidence and Basic Human...
6Legal Implications of Data Mining : Assessing the European U...Colonna, Liane, 1981-,2016Legal Implications of Data Mining : Assessing the European U...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 1.788.413 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 60 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2019 Illius Media