Books on the topic 'Secur'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Secur.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Laird, Robbin F. Britain's security policy: The Modern Soviet view. Alliance for the Institute for European Defence & Strategic Studies, 1988.
Find full textDonnelly, C. N. Nations, alliances and security: A collection of writings. Akadémiai Kiadó, 2004.
Find full textMima, Cataldo, ed. The Women's encampment for a future of peace and justice: Images and writings. Temple University Press, 1987.
Find full textBaumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.
Full textHegarty, Cain. Suffolk's defended shore: Coastal fortifications from the air. English Heritage, 2007.
Find full textLeader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.
Find full textHammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038.
Full textState, United States Department of. Arab-Israeli dispute 1964-1967. Dept. of State, 2000.
Find full textCHATTERJEA. Intro Deriv Secur, Fin (3rd Ed). World Scientific Publishing Co Pte Ltd, 2024.
Find full textCHATTERJEA. Intro Deriv Secur, Fin (3rd Ed) Hb. World Scientific Publishing Co Pte Ltd, 2024.
Find full textDavis, Wayne R., and Malcolm R. Davis. Military Transformation in East Asia: Technology WarfareFut Secur. Taylor & Francis Group, 2005.
Find full textCCSP Self-Study: Securing Cisco IOS Networks (SECUR) (Ccsp Self-Study). 2nd ed. Cisco Press, 2004.
Find full textClark, Susan, and Robin F. Laird. Britain's Security Policy: The Modern Soviet View. Hyperion Books, 1990.
Find full textCCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501) (Exam Certification Guide). 2nd ed. Cisco Press, 2003.
Find full textHancock, H. Irving. The Grammar School Boys in Summer Athletics or, Dick & Co. Make Their Fame Secur. CreateSpace Independent Publishing Platform, 2016.
Find full textUS GOVERNMENT. Combating Terrorism: Axis of Evil, Multilateral Containment or Unilateral Confrontation?: Hearing Before the Subcommittee on National Secur. Government Printing Office, 2003.
Find full textLarson, Robert, and Lance Cockcroft. CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI). McGraw-Hill Osborne Media, 2003.
Find full textCCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI). McGraw-Hill Osborne Media, 2003.
Find full textThe Need for Comprehensive Immigration Reform: Strengthening Our National Security: Joint Hearing Before the Subcommittee on Immigration, Border Secur. Not Avail, 2005.
Find full textGertz, Bill. Treachery: How America's Friends and Foes Are Secretly Arming Our Enemies. Three Rivers Press, 2005.
Find full textGertz, Bill. Treachery: How America's Friends and Foes Are Arming Our Enemies. Blackstone Audiobooks, 2005.
Find full text(Narrator), Alan Sklar, ed. Treachery: Library Edition. Blackstone Audiobooks, 2005.
Find full textCataldo, Mima, Ruth Putter, Bryna Fireside, and Elaine Lytel. The Women's Encampment for a Future of Peace and Justice: Images and Writings. Temple Univ Pr, 1987.
Find full textUS GOVERNMENT. Instilling Agility, Flexibility and a Culture of Achievement in Critical Federal Agencies: A Review of H.R. 1836, the Civil Service and National Secur. Government Printing Office, 2003.
Find full textKazuo, Ogura, Anne-Marie Slaughter, and Carl Bildt. The New Challenges To International, National And Human Security Policy: A Report to the Trilateral Commission : The Triangle Papers 58 (Triangle Papers). Trilateral Commission, 2004.
Find full textDoes the "Total Force" Add Up?: The Impact of Health Protection Programs on Guard and Reserve Units: Hearing Before the Subcommittee on National Secur. Not Avail, 2004.
Find full textDonnelly, C. N., and Chris Donnelly. Nations, Alliances And Security. Akademiai Kiado, 2004.
Find full textKussin, Annette. Secure Parent, Secure Child. Guernica Editions, Incorporated, 2023.
Find full textFoust, Mark. MCSE Winsrv03 Ntwrk Int SG 2E W/CD with Winsrv03 Active Dir SG 2E W/CD Windsrv03 Ntwrk Secur SG W/CD and Winsrv03 Ntwrk Sec W/CD. Wiley & Sons, Incorporated, John, 2010.
Find full textMahan, Sue, and Pamala L. Griset. Terrorism in Perspective. SAGE Publications, Inc, 2012.
Find full textSchweitzer, Glenn E., and Carole C. Dorsch. Super-Terrorism: Assassins, Mobsters and Weapons of Mass Destruction. Plenum Trade, 1998.
Find full textMahan, Sue, and Pamala L. Griset. Terrorism in Perspective. Sage Publications, Inc, 2007.
Find full textHegart, Cain, and Sarah Newsome. Suffolk's Defended Shore: Coastal Fortifications from the Air. English Heritage, 2007.
Find full textNewsome, Sarah, and Cain Hegarty. Suffolk's Defended Shore: Coastal Fortifications from the Air. Historic England Publishing, 2014.
Find full text