To see the other types of publications on this topic, follow the link: Data processing security.

Books on the topic 'Data processing security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data processing security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Atluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Atluri, Vijay, and Pierangela Samarati, eds. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4461-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elbra, R. A. Computer security handbook. Manchester: NCC Blackwell, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6315-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhattacharjee, Arup, Samir Kr Borgohain, Badal Soni, Gyanendra Verma, and Xiao-Zhi Gao, eds. Machine Learning, Image Processing, Network Security and Data Sciences. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

1961-, Meyers Michael, ed. Security+. Berkeley, Calif: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

DCE security programming. Sebastopol, CA: O'Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Conference on Data Processing in the Field of Social Security (6th 1991 Helsinki, Finland). Data processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security. Geneva: International Social Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Physical security. New York, NY: PricewaterhouseCoopers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Microcomputer data security: Issues and strategies. New York, NY: Prentice Hall Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Buck, Edward R. Introduction to data security and controls. 2nd ed. Boston: QED Technical Pub. Group, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Doswell, Brian. Managing information security: Achieving BS 7799. London: FT Pitman, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

International Federation of Accountants. Small and Medium Practices Task Force. Controlling computers in business: Logical access security. [United States?]: PricewaterhouseCoopers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zviran, Moshe. Passwords security: An exploratory study. Monterey, Calif: Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

National Research Council (U.S.). Committee on Assessment of Security Technologies for Transportation. Fusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

National Research Council (U.S.). Committee on Assessment of Security Technologies for Transportation. Fusion of security system data to improve airport security. Washington, D.C: National Academies Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bruce, Glen. Security in distributed computing: Did you lock the door? Saddle River, NJ: Prentice Hall, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

B, White Gregory, ed. Principles of computer security: CompTIA security+ and beyond. 2nd ed. San Francisco, CA: McGraw-Hill Companies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Conklin, Wm Arthur. Principles of computer security: CompTIA security+ and beyond. 2nd ed. San Francisco, CA: McGraw-Hill Companies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Saltman, Roy G. Accuracy, integrity, and security in computerized vote-tallying. Washington, D.C: National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Saltman, Roy G. Accuracy, integrity, and security in computerized vote-tallying. Gaithersburg, MD: U.S. Dept of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

J, Stang David. Microcomputer security. 6th ed. Washington, D.C: International Computer Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

J, Stang David. Microcomputer security. 3rd ed. Washington, D.C: International Computer Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

International Conference on Data Processing in the Field of Social Security (4th 1985 Madrid, Spain). New data processing techniques in social security: IVth International Conference on Data Processing in the Field of Social Security, Madrid, 1-3 October 1985. Geneva: General Secretariat of the ISSA, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Essinger, James. Computer security in financial organisations. Oxford: Elsevier Advanced Technology, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Computer audit, control, and security. New York: Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wood, Michael B. Guidelines for physical computer security. Manchester: NCC Publications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Baker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Telecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Washington, DC: Veterans Administration, Office of Data Management and Telecommunications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kirk, Hausman Kalani, and Weiss Martin, eds. CompTIA security+ exam cram. 2nd ed. Indianapolis, Ind: Que Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

1956-, Atluri Vijay, and Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Data Base Security. Elsevier, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Miller, Donald G. Security Guidelines for Electronic Data Processing Operations. Bank Administration Inst, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

American Institute of Certified Public Accountants., ed. Information security. Jersey City, NJ: American Institute of Certified Public Accountants, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

S, Snoyer Robert, Fischer Glenn A, and Chantico Publishing Co, eds. Managing microcomputer security. Homewood, Ill: Business One Irwin, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Weiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Saini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Saini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Saini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Computer Security, Electronic Data Processing, Audit and Control. Elsevier Science, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Saini, Hemraj, Geetanjali Rathee, and Dinesh Kumar Saini. Large-Scale Data Streaming, Processing, and Blockchain Security. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Brocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Data processing for decision-making: VIth International Conference on Data Processing in the Field of Social Security (Social security documentation). International Social Security Association, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography