Books on the topic 'Electronic security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Electronic security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Shoniregun, Charles A. Electronic Healthcare Information Security. Springer Science+Business Media, LLC, 2010.
Find full textBailin, Paul, and Diana E. Kole. Electronic security: Products & system. Freedonia Group, 2000.
Find full textShoniregun, Charles A., Kudakwashe Dube, and Fredrick Mtenzi. Electronic Healthcare Information Security. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5.
Full textMartin, Vaughn. Electronic & microprocessor controlled security projects. Tab Books, 1985.
Find full textShellnack, Mark. Electronic commerce security technologies and mechanisms. Oxford Brookes University, 2001.
Find full textPao, Hua-Fu. Security management of electronic data interchange. Naval Postgraduate School, 1993.
Find full text1942-, Blackstone Erwin A., ed. Securing home and business: A guide to the electronic security industry. Butterworth-Heinemann, 1997.
Find full textInternational Carnahan Conference on Security Technology (1993). Proceedings : 1993 International Carnahan Conference on Security Technology, Security Technology: October 13-15, 1993. Edited by Sanson Larry D, Institute of Electrical and Electronics Engineers. Lexington Section., IEEE Aerospace and Electronic Systems Society., and G. Levett & Associates. IEEE, 1993.
Find full textInformation Systems Audit and Control Foundation, ed. E-commerce security: Securing the network perimeter. Information Systems Audit and Control Foundation, 2002.
Find full textM, Feinman Todd, ed. Electronic commerce: Security, risk management, and control. Irwin/McGraw-Hill, 1999.
Find full textL, Mendell Ronald. Document security: Protecting physical and electronic content. Charles C Thomas, Publisher, 2007.
Find full textA, Vasarhelyi Miklos, ed. Electronic commerce: Security, risk management, and control. 2nd ed. McGraw-Hill/Irwin, 2002.
Find full textMontana. Legislature. Legislative Audit Division. Montana State University: Electronic research data security. Legislative Audit Division, 2006.
Find full textWelch, Mary F., Margaret K. Strekal, Diana E. Kole, and Tonia Ferrell. Security products. Freedonia Group, 2001.
Find full textPrinciples of security consulting: An introduction to professional security consulting. American Book Pub., 2002.
Find full textBulmer, O. F. Computer security. Institute of Chartered Accountants in England and Wales, 1988.
Find full textKhairallah, Michael. Physical security systems handbook: The design and implementation of electronic security systems. Elsevier/Butterworth Heinemann, 2004.
Find full textKhairallah, Michael. Physical security systems handbook: The design and implementation of electronic security systems. Butterworth-Heinemann, 2005.
Find full textElectronic security systems: Better ways to crime prevention. 2nd ed. Butterworths, 1988.
Find full textLlewellyn, Brian H. Standards for electronic security tagging: A feasibility study. Book Industry Communication, 1995.
Find full textParker, Philip M. Electronic security in Chile: A strategic reference, 2006. Icon Group International, 2006.
Find full textNFPA pocket guide to electronic security system installation. National Fire Protection Association, 2005.
Find full textJ, Stang David. Microcomputer security. 6th ed. International Computer Security Association, 1992.
Find full textJ, Stang David. Microcomputer security. 3rd ed. International Computer Security Association, 1992.
Find full textBailin, Paul, and Rebecca L. Friedman. Security surveillance & monitoring systems. Freedonia Group, 1998.
Find full textChristmas, Paul. EDI: Implementation and security. Elsevier Advanced Technology, 1994.
Find full textElectronic Security Systems. Elsevier, 2007. http://dx.doi.org/10.1016/b978-0-7506-7999-2.x5000-1.
Full textShoniregun, Charles A. A., Kudakwashe Dube, and Fredrick Mtenzi. Electronic Healthcare Information Security. Springer, 2012.
Find full textSettlements, Bank for International, Committee on Payment and Settlement Systems., and Group of Computer Experts of the central banks of the Goup of Ten Countries., eds. Security of electronic money. Bank for International Settlements, 1996.
Find full text