To see the other types of publications on this topic, follow the link: Electronic data processing – Security systems.

Books on the topic 'Electronic data processing – Security systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Electronic data processing – Security systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

T, Pritchard J. A., ed. Security in office systems. NCC Publications, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security of computer based information systems. Macmillan Education, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lane, V. P. Security of computer based information systems. Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Managing Risk in Information Systems. Jones & Bartlett Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bowman, Ronald H. Business continuity planning for data centers and systems: A strategic implementation guide. John Wiley & Sons, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Steinauer, Dennis. Security of personal computer systems: A management guide. U.S. Dept. of Commerce, National Bureau of Standards, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. Miller Freeman Inc., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davies, Donald Watts. Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1939-, Simons G. L., ed. Fraud and abuse of IT systems. NCC Publications, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Cheatham, Anne J. Contingency planning: Sample contingency planning procedures : information systems, operations, delivery systems, and administrative functions. AlexInformation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zubairi, Junaid Ahmed. Cyber security standards, practices and industrial applications: Systems and methodologies. Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Raggad, Bel G. Information security management: Concepts and practice. Taylor & Francis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

National Computer Security Center (U.S.), ed. A guide to understanding configuration management in trusted systems. National Computer Security Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tittel, Ed. CISSP: Certified Information Systems Security Professional study guide. SYBEX, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Police, Royal Canadian Mounted. Technical security standard for information technology. Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Security engineering: A guide to building dependable distributed systems. Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Security engineering: A guide to building dependable distributed systems. 2nd ed. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Xiao, Yang. Security in distributed and networking systems. World Scientific, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Guard, United States Coast. Automated information systems (AIS) security manual. U.S. Dept. of Transportation, U.S. Coast Guard, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Society, Canadian Information Processing. The protection of privacy in information systems: Operational guidelines. The Society, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Stallings, William. Business data communications: Infrastructure, networking and security. 8th ed. Pearson, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

United States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

United States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

United States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sair Linux and GNU certification level I: Security, ethics, and privacy. Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jordan, Carole S. A Guide to understanding discretionary access control in trusted systems. National Computer Security Center, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Guard, United States Coast. Automated information systems (AIS) security manual. U.S. Dept. of Transportation, U.S. Coast Guard, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

IFIP TCII International Conference onComputer Security (4th 1986 Monte Carlo, Monaco). Security and protection in information systems: Proceedings of the fourth IFIP TCII International Conference on Computer Security, IFIP/Sec'86 Monte Carlo, Monaco, 2-4 December, 1986. North-Holland, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

IFIP International Conference on Computer Security (4th 1986 Monte-Carlo, Monaco). Security and protection in information systems: Proceedings of the Fourth IFIP TC 11 International Conference on Computer Security, IFIP/SEC '86, Monte Carlo, Monaco, 2-4 December, 1986. North-Holland, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hook, Chris. Data protection implications for systems design. NCC Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Service, United States Internal Revenue. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

United States. Internal Revenue Service. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

United States. Internal Revenue Service. You are the key!: An employee guide to Automated Information Systems Security. Dept. of the Treasury, Internal Revenue Service, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Privacy, and Security Research Group Workshop on Network and Distributed System Security (1993 San Diego Calif ). Privacy and Security Research Group Workshop on Network and Distributed System Security: Proceedings, February 11-12, 1993, Catamaran Hotel, San Diego, California. s.n.], 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Montana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Administration: Information system audit. The Division, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Montana. Legislature. Legislative Audit Division. Montana Lottery security, Department of Commerce: Information system audit. The Division, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

editor, Malik Javvad, ed. Official (ISC)2® guide to the CISSP® CBK®: Certified Information Systems Security Professional. CRC Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Stewart, Eric L. CCNA security exam cram. Que Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Toshimitsu, Masuzawa, and Tixeuil Sébastien, eds. Stabilization, safety, and security of distributed systems: 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

1975-, Chapple Mike, and Tittel Ed, eds. CISSP: Certified Information Systems Security Professional. 5th ed. Wiley Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Stewart, James Michael. CISSP: Certified Information Systems Security Professional. 4th ed. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Michael, Stewart James, and Chapple Mike, eds. CISSP: Certified Information Systems Security Professional. 2nd ed. SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chakrabarti, Anirban, Abhijit Belapurkar, Harigopal Ponnapalli, Niranjan Varadarajan, and Srinivas Padmanabhuni. Distributed Systems Security: Issues, Processes and Solutions. Wiley & Sons, Incorporated, John, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

SSCP Systems Security Certified Practitioner. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

1948-, Muftic Sead, ed. Security architecture for open distributed systems. Wiley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Saddington, T. Security for Small Computer Systems. Elsevier Science, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!