Bücher zum Thema „Security measures“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Security measures" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Hakim, Simon. Commercial security: Burglary patterns and security measures. Security Industry Association, 1994.
Den vollen Inhalt der Quelle findenParsons, Brinckerhoff Quade &. Douglas. Transportation security. Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenCorporation, Science Applications International. Security Measures for Ferry Systems. Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Der volle Inhalt der QuelleUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., et al., eds. Transportation security. Transportation Research Board, 2006.
Den vollen Inhalt der Quelle findenFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Transportation Research Board, 2009.
Den vollen Inhalt der Quelle findenMelissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.
Den vollen Inhalt der Quelle findenPope, Matthew. Emergency planning and security measures I. Pearson Custom Pub., 2005.
Den vollen Inhalt der Quelle findenUnited States. Dept. of State. Bureau of Public Affairs, ed. Confidence-- and security-building measures negotiations. Bureau of Public Affairs, Dept. of State, 1989.
Den vollen Inhalt der Quelle findenUnited States. Dept. of State. Bureau of Public Affairs, ed. Confidence-- and security-building measures negotiations. Bureau of Public Affairs, Dept. of State, 1989.
Den vollen Inhalt der Quelle findenASIS Standing Committee on Transportation Security. Seaports and Harbors Subcommittee., ed. Maritime security manual. American Society for Industrial Security, 1990.
Den vollen Inhalt der Quelle findenJohn, Mallery, ed. Hardening network security. McGraw-Hill/Osborne, 2005.
Den vollen Inhalt der Quelle findenKelly, Wayne. Security hardware and security system planning for museums. Canadian Conservation Institute, 1998.
Den vollen Inhalt der Quelle findenTahmisoğlu, Mete, and Cinar Özen. Transportation security against terrorism. IOS, 2009.
Den vollen Inhalt der Quelle findenMete, Tahmisoğlu, Özen Cinar, North Atlantic Treaty Organization. Public Diplomacy Division., and NATO Advanced Research Workshop on Transportation Security Measures to Counter Terrorism (2008 : Ankara, Turkey), eds. Transportation security against terrorism. IOS, 2009.
Den vollen Inhalt der Quelle findenR, Bragdon Clifford, ed. Transportation security. Elsevier, 2008.
Den vollen Inhalt der Quelle findenDonnelly, Lancaster, and Association of Research Libraries. Office of Leadership and Management Services., eds. Security in special collections. Association of Research Libraries, Office of Leadership and Management Services, 2004.
Den vollen Inhalt der Quelle findenDefense, U. S. Dept of. Industrial security regulation. Dept. of Defense, 1985.
Den vollen Inhalt der Quelle findenBeaudry, Mark H. Contemporary lodging security. Butterworth-Heinemann, 1996.
Den vollen Inhalt der Quelle findenT, Kimball Chad, ed. Travel security sourcebook. Omnigraphics, 2003.
Den vollen Inhalt der Quelle findenNational Association for Court Management (U.S.). Security Guide Subcommittee., ed. Court security guide. National Association for Court Management, 1995.
Den vollen Inhalt der Quelle findenMacLean, Iain G. C. Commonsense security in industry: The definitive guide to security for the non-professional security manager. Anubis, 1993.
Den vollen Inhalt der Quelle findenTeumim, David J. Industrial network security. 2nd ed. ISA, 2010.
Den vollen Inhalt der Quelle findenParker, Sara K. Security Measures. Harlequin Enterprises, Limited, 2019.
Den vollen Inhalt der Quelle findenParker, Sara K. Security Measures. Harlequin Mills & Boon, Limited, 2019.
Den vollen Inhalt der Quelle findenParker, Sara K. Security Measures. Harlequin Enterprises, Limited, 2019.
Den vollen Inhalt der Quelle findenWayne, Joanna. Security Measures. Harlequin Mills & Boon, Limited, 2007.
Den vollen Inhalt der Quelle findenWayne, Joanna. Security Measures. Harlequin Mills & Boon, Limited, 2012.
Den vollen Inhalt der Quelle findenCooke, Rodrick D., and Efren M. Velazquez. Proliferation Security Measures. Nova Science Publishers, Incorporated, 2012.
Den vollen Inhalt der Quelle findenSecurity. Published for the National Examining Board for Supervisory Management by Pergamon Open Learning, 1990.
Den vollen Inhalt der Quelle findenPope, Matthew. Emergency Plannng and Security Measures. Prentice Hall, 2006.
Den vollen Inhalt der Quelle findenWu, Chuan-Kun. Internet of Things Security: Architectures and Security Measures. Springer, 2022.
Den vollen Inhalt der Quelle findenInternet of Things Security: Architectures and Security Measures. Springer Singapore Pte. Limited, 2021.
Den vollen Inhalt der Quelle findenHalleen, Gary, and Greg Kellogg. Security Monitoring with Cisco Security MARS (Networking Technology: Security). Cisco Press, 2007.
Den vollen Inhalt der Quelle findenPérez, André. Network Security. Wiley & Sons, Incorporated, John, 2014.
Den vollen Inhalt der Quelle findenPérez, André. Network Security. Wiley & Sons, Incorporated, John, 2014.
Den vollen Inhalt der Quelle findenPérez, André. Network Security. Wiley & Sons, Incorporated, John, 2014.
Den vollen Inhalt der Quelle findenPérez, André. Network Security. Wiley & Sons, Incorporated, John, 2014.
Den vollen Inhalt der Quelle findenHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Den vollen Inhalt der Quelle findenDouligeris, Christos, and Dimitrios N. Serpanos. Network Security. Wiley & Sons, Incorporated, John, 2007.
Den vollen Inhalt der Quelle finden