Start
Om tjänsten
TräffBildTitelFörfattare (1st/rad)TrycktBeskrivningIdentifiering
Google Books
1Information SecurityMark S. Merkow2014-05-26Information Security: Principles and Practices, Second Editi...ISBN-13:0133589633
2Computer SecurityWilliam Stallings2012-02-28This is the eBook of the printed book and may not include an...ISBN-13:0133072630
3Information SecurityMark Stamp2011-05-03Now updated—your expert guide to twenty-first century info...ISBN-13:0470626399
4Computer Security: Principles and Practice PDF ebook, Global...William Stallings2015-01-26Computer Security: Principles and Practice, Third Edition, i...ISBN-13:1292066202
5Information Security: Principles and PracticesMiles Carr2017-04-18This book elucidates the concepts and innovative models arou...ISBN-13:9781635491517
6Advances in Cyber Security: Principles, Techniques, and Appl...Kuan-Ching Li2018-12-06This book provides state-of-the-art coverage of the principl...ISBN-13:9811314837
7Cryptography and Network SecurityWilliam Stallings2003William Stallings' book provides comprehensive and completel...ISBN-13:9780131115026
8MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICEDeven N. Shah2009-07-01Special Features: "Includes a new chapter on network securit...ISBN-13:9788126519873
9Handbook of Research on Intrusion Detection SystemsGupta, Brij B.2020-02-07Businesses in today’s world are adopting technology-enable...ISBN-13:1799822435
10Cybersecurity Architect's HandbookLester Nichols2024-03-29Discover the ins and outs of cybersecurity architecture with...ISBN-13:1803239891
11CyberWar, CyberTerror, CyberCrime and CyberActivismJulie Mehan2014-05-08This book encourages cybersecurity professionals to take a w...ISBN-13:1849285713
12Transforming Cybersecurity: Using COBIT 5ISACA2013-06-18The cost and frequency of cybersecurity incidents are on the...ISBN-13:1604203412
13Study Guide to ISO 27001 Compliance2024-10-26Designed for professionals, students, and enthusiasts alike,...ISBN-13:1836796331
14Information Assurance Handbook: Effective Computer Security ...Corey Schou2014-09-12Best practices for protecting critical data and systems Info...ISBN-13:0071826319
15Cryptography And Network Security Principles And PracticesWilliam Stallings2002ISBN-13:9788178086057
16Computer Security Fundamentals + Information SecurityMark Merkow2007-07-02This package contains the following components: -0131711296:...ISBN-13:9780131593664
17Information Technology Applications in Industry IIPrasad Yarlagadda2013-09-03Selected, peer reviewed papers from the 2013 2nd Internation...ISBN-13:3038262455
18Computer Security: Principles and Practice, Global EditionWilliam Stallings2018-06-21The full text downloaded to your computer With eBooks you ca...ISBN-13:1292220635
19The Handbook of Computer Networks, Distributed Networks, Net...Hossein Bidgoli2008The Handbook of Computer Networks is the third set of refere...UCSC:32106019498671
20Information Economy Report 2005United Nations Conference on Trade and Development2005This new annual publication analyses current trends in infor...IOWA:31858051445793
Libris
1Information security : principles and practicesMerkow, Mark S.ArrayInformation security : principles and practices
2Information security : principles and practicesMerkow, Mark S.c2005Information security : principles and practices
3Information security. [Elektronisk resurs] : a strategic app...LeVeque, VincentArrayInformation security. [Elektronisk resurs] : a strategic app...
4Information security governance in the public sector [Elektr...Magnusson, Lars, 1952-2025Information security governance in the public sector [Elektr...
5Information Security Handbook. [Elektronisk resurs] : Enhanc...Death, DarrenArrayInformation Security Handbook. [Elektronisk resurs] : Enhanc...
6Information Security : Principles and Practices [Elektronisk...Merkow, Mark.uuuu-uuuuInformation Security : Principles and Practices [Elektronisk...
7Information Security: Principles and Practices [Elektronisk ...Merkow, Mark S2014Information Security: Principles and Practices [Elektronisk ...
8Network Security Principles and Practices [Elektronisk resur...Malik, Saadat2002Network Security Principles and Practices [Elektronisk resur...
9Planning optimal library spaces : principles, processes, and...Moore, David R., II, 1966-ArrayPlanning optimal library spaces : principles, processes, and...
10Bring Your Own Device Security Policy Compliance Framework [...Palanisamy, Rathika.2025Bring Your Own Device Security Policy Compliance Framework [...
11Innovative Practices in Teaching Information Sciences and Te...Carroll, John M.2014Innovative Practices in Teaching Information Sciences and Te...
12Data Privacy and Crowdsourcing A Comparison of Selected Prob...Hornuf, Lars.2023Data Privacy and Crowdsourcing A Comparison of Selected Prob...
13"Information Security: Principles and Practices, Second Edit...Mark S. Merkow. Jim Breithaupt.2014"Information Security: Principles and Practices, Second Edit...
14Information Security: Principles and Practices, Second Editi...Merkow, Mark S.2014Information Security: Principles and Practices, Second Editi...
15Aviation Security, Privacy, Data Protection and Other Human ...Enerstvedt, Olga Mironenko.2017Aviation Security, Privacy, Data Protection and Other Human ...
16Mobile inter-networking with IPv6 [Elektronisk resurs] conce...Koodli, Rajeev S., 1968-c2007Mobile inter-networking with IPv6 [Elektronisk resurs] conce...
17Computerization and controversy : value conflicts and social...cop. 1996Computerization and controversy : value conflicts and social...
18Privacy and Identity Management. Time for a Revolution? 10th...2016Privacy and Identity Management. Time for a Revolution? 10th...
19The DevOps handbook : how to create world-class agility, rel...Kim, GeneArrayThe DevOps handbook : how to create world-class agility, rel...
20Microsoft 365 Security, Compliance, and Identity Administrat...Rising, PeterArrayMicrosoft 365 Security, Compliance, and Identity Administrat...
21Business Information Systems Workshops [Elektronisk resurs] ...Abramowicz, Witold.2014Business Information Systems Workshops [Elektronisk resurs] ...
22Generally accepted principles and practices for securing inf...Swanson, Marianne1996Generally accepted principles and practices for securing inf...
23Data governance and policy in Africa2023Data governance and policy in Africa
24Governance, risk, and compliance handbook : technology, fina...c2008Governance, risk, and compliance handbook : technology, fina...
25Implementing DevSecOps Practices. [Elektronisk resurs] : Sup...Sehgal, Vandana VermaArrayImplementing DevSecOps Practices. [Elektronisk resurs] : Sup...
26South African Institute of Computer Scientists and Informati...Gerber, Aurona.2023South African Institute of Computer Scientists and Informati...
27Information security : principles and practices / Mark S. Me...Merkow, Mark S.uuuu-uuuuInformation security : principles and practices / Mark S. Me...
28From trustworthy AI principles to public procurement practic...Hickok, MerveArrayFrom trustworthy AI principles to public procurement practic...
29Context-Based Micro-Training [Elektronisk resurs] Enhancing ...Kävrestad, Joakim, 1989-2022Context-Based Micro-Training [Elektronisk resurs] Enhancing ...
30Technology and Religious Tourism. [Elektronisk resurs] : Eme...Tyagi, Pankaj Kumar.ArrayTechnology and Religious Tourism. [Elektronisk resurs] : Eme...
31Information Systems Management in the Big Data Era [Elektron...Lake, Peter.2014Information Systems Management in the Big Data Era [Elektron...
32Software Project Management for Distributed Computing Life-C...2017Software Project Management for Distributed Computing Life-C...
33Food and Nutrition Security in the Kingdom of Saudi Arabia, ...Ahmed, Adam E.ArrayFood and Nutrition Security in the Kingdom of Saudi Arabia, ...
34Machine Learning Security with Azure. [Elektronisk resurs] :...Kalyva, GeorgiaArrayMachine Learning Security with Azure. [Elektronisk resurs] :...
35Cybersecurity Teaching in Higher Education2023Cybersecurity Teaching in Higher Education
36MobiLeak [Elektronisk resurs] Security and Privacy of Person...Stirparo, Pasquale2015MobiLeak [Elektronisk resurs] Security and Privacy of Person...
37Handbook of Fire and Explosion Protection Engineering Princi...Nolan, Dennis P.2010Handbook of Fire and Explosion Protection Engineering Princi...
38Context-Based Micro-Training [Elektronisk resurs] Enhancing ...Kävrestad, Joakim, 1989-2022Context-Based Micro-Training [Elektronisk resurs] Enhancing ...
39Information security [electronic resource] : principles and ...Merkow, Mark S.uuuu-uuuuInformation security [electronic resource] : principles and ...
40Horizons of security : the Somali safety net in ScandinaviaZoppi, Marco, 1988-ArrayHorizons of security : the Somali safety net in Scandinavia
SwePub
1Developing an information classification methodBergström, Erik, 1976- Karlsson, Fredrik, 1974- Åhlfeldt, Rose-Mharie, 1960- Developing an information classification method
2Information security governance in the public sector : inves...Magnusson, Lars, 1952- Iqbal, Sarfraz, 1979- Elm, Patrik, Universitetslektor, 1972- Dalipi, Fisnik, Associate professor Information security governance in the public sector : inves...
3Context-Based Micro-Training : Enhancing cybersecurity train...Kävrestad, Joakim, 1989- Nohlberg, Marcus, 1976- Furnell, Steven Åhlfeldt, Rose-Mharie, 1960- Context-Based Micro-Training : Enhancing cybersecurity train...
4MobiLeak : Security and Privacy of Personal Data in Mobile A...Stirparo, Pasquale Muftic, Sead, Professor Furnell, Steven Marcus, Professor MobiLeak : Security and Privacy of Personal Data in Mobile A...
5Automated architecture modeling for enterprise technology ma...Välja, Margus, 1981- Korman, Matus, 1985- Lagerström, Robert, 1981- Franke, Ulrik Automated architecture modeling for enterprise technology ma...
6Charlatanry in forensic speech science : A problem to be tak...Eriksson, Anders Lacerda, Francisco Charlatanry in forensic speech science : A problem to be tak...
7Assessment of safety processes in requirements engineeringVilela, Jéssyka Castro, Jaelson Martins, Luiz Eduardo Gorschek, Tony, 1972- Assessment of safety processes in requirements engineering
8Don't Patch the Researcher, Patch the Game : A Systematic Ap...Dirksen, Alexandra Giessler, Sebastian Erz, Hendrik, 1990- Johns, Martin Don't Patch the Researcher, Patch the Game : A Systematic Ap...
9Automating Data Extraction from Semi-Structured Industrial D...Möller, T. Singh, I. Bucaioni, Alessio, 1987- Cicchetti, Antonio Automating Data Extraction from Semi-Structured Industrial D...
10Protecting the Integrity of Digital Evidence and Basic Human...Saleem, Shahzad, 1977- Popov, Oliver, Professor Foukia, Noria Protecting the Integrity of Digital Evidence and Basic Human...
11Invited Paper: Smart Autonomous Cyber-Physical SystemsBertino, Elisa Nadjm-Tehrani, Simin Invited Paper: Smart Autonomous Cyber-Physical Systems
12The Perspective of Agile Software Developers on Data Privacy...Peixoto, Mariana Gorschek, Tony, 1972- Mendez, Daniel Silva, Carla The Perspective of Agile Software Developers on Data Privacy...
13Legal Implications of Data Mining : Assessing the European U...Colonna, Liane, 1981- Magnusson Sjöberg, Cecilia, Professor Bakardjieva-Engelbrekt, Antonina, Professor Svantesson, Dan, Professor Legal Implications of Data Mining : Assessing the European U...
14Food Aid Technology : The Experience of a Syrian Refugee Com...Talhouk, Reem Refaat Coles-Kemp, Lizzie Jensen, Rikke Bjerg Balaam, Madeline Food Aid Technology : The Experience of a Syrian Refugee Com...
15A Global Perspective on Phosphorus Management Decision Suppo...Djodjic, Faruk Mellander, Per-Erik A Global Perspective on Phosphorus Management Decision Suppo...
16A growing concern : Online access to minors’ health record...Hagström, Josefin, 1990- Hägglund, Maria, Docent, 1975- Blease, Charlotte, Docent Scandurra, Isabella, PhD A growing concern : Online access to minors’ health record...

Referenser till uppsats

Med Bokreferens.se kan du söka efter böcker, artiklar och avhandlingar mm.
Du hittar färdiga referenser till din uppsats som du kan klista in i ditt arbetes källförteckning.
Bokreferens stödjer referensmallen för: APA, Harvard, Oxford samt Vancouver.
Nytt är att du numera även kan jämföra priser på böcker och studentlitteratur.
Om tjänsten | Senaste Sökningar

Hittils har 4.792.535 st sökningar gjorts på Bokreferens.se
sedan starten 2012-10-19, 127 st har genomförts idag.

Bokreferens.se bygger på API från Google Books, Libris och SwePub.
Prisjämförelser sker med tillstånd från:

Adlibris Bokus

Syskonsajter: Loggbok.nu | Pluggis.nu | Radiolinker.com

© Copyright 2026 Illius Media