Books on the topic 'Security analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Information security risk analysis. 2nd ed. Boca Raton: Auerbach Publications, 2005.
Find full textInformation security risk analysis. 3rd ed. Boca Raton, FL: Auerbach Publications, 2010.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 6th ed. Englewood Cliffs, N.J: Prentice Hall, 1995.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 4th ed. Englewood Cliffs, N.J: Prentice-Hall, 1987.
Find full textFischer, Donald E. Security analysis and portfolio management. 4th ed. London: Prentice-Hall International, 1987.
Find full textFischer, Donald E. Security analysis and portfolio management. 5th ed. Englewood Cliffs (N.J.): Prentice-Hall International, 1991.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 5th ed. Englewood Cliffs, N.J: Prentice Hall, 1991.
Find full textBenjamin, Graham. Graham and Dodd's security analysis. 5th ed. New York: McGraw-Hill, 1988.
Find full textFuller, Russell J. Modern investments and security analysis. Maidenhead: McGraw-Hill, 1986.
Find full textGraham, Benjamin. Graham and Dodd's security analysis. 5th ed. New York: McGraw-Hill, 1988.
Find full textKlein, Peter J. Getting started in security analysis. 2nd ed. Hoboken, N.J: Wiley, 2010.
Find full textHackel, Kenneth S. Cash flow and security analysis. Homewood, IL: Business One Irwin, 1992.
Find full textInternational Union for Conservation of Nature and Natural Resources and Ecosystems for Life (Project), eds. Situation analysis on energy security. Bangkok: IUCN Asia Regional Office, 2014.
Find full textKlein, Peter J. Getting started in security analysis. 2nd ed. Hoboken, N.J: John Wiley & Sons, 2009.
Find full textGhosh, Nilanjan. Situation analysis on environmental security. Dhaka: International Union for Conservation of Nature and Natural Resources, 2012.
Find full textFuller, Russell J. Modern investments and security analysis. New York: McGraw-Hill, 1987.
Find full textSingh, Shveta, and Surendra S. Yadav. Security Analysis and Portfolio Management. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2520-6.
Full textKlein, Peter J. Getting started in security analysis. 2nd ed. Hoboken, N.J: John Wiley & Sons, 2009.
Find full textBenjamin, Graham. Graham and Dodd's security analysis. 5th ed. New York: McGraw-Hill, 1989.
Find full textStephen, Northcutt, ed. Intrusion signatures and analysis. Indianapolis, Ind: New Riders, 2001.
Find full textSecurity matters: Getting software security right with static analysis. Upper Saddle River, NJ: Addison-Wesley, 2007.
Find full textC, Gompert David, ed. Analysis of strategy-- strategies of analysis. Santa Monica, CA: Rand Corp., 2008.
Find full textEugene, Tucker, ed. Risk analysis and the security survey. 4th ed. Waltham, MA: Butterworth-Heinemann, 2012.
Find full textMcLaren, Richard H. Personal property security: An introductory analysis. 5th ed. Scarborough, Ont: Carswell, 1992.
Find full textMcLaren, Richard H. Personal property security: An introductory analysis. 3rd ed. Toronto, Canada: Carswell, 1985.
Find full textThomas, Norman. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textHearth, Douglas. Contemporary investments: Security and portfolio analysis. Fort Worth: Dryden Press, 1995.
Find full textMcLaren, Richard H. Personal property security: An introductory analysis. 4th ed. Toronto: Carswell, 1987.
Find full textMurray, Roger F., Sidney Cottle, and Frank E. Block. Security Analysis. McGraw-Hill, 1988.
Find full textMurray, Roger F., Sidney Cottle, and Frank E. Block. Security Analysis. 5th ed. McGraw-Hill, 1988.
Find full textMurray, Roger F., Sidney Cottle, and Frank E. Block. Security Analysis. McGraw-Hill Companies, 1990.
Find full textMurray, Roger F., Sidney Cottle, and Frank E. Block. Security Analysis. 5th ed. McGraw-Hill Companies, 1990.
Find full textOffice, Great Britain: Scotland. Scotland Analysis: Security. Stationery Office, The, 2013.
Find full textPeltier. Information Security Risk Analysis. Auerbach Publications, 2001. http://dx.doi.org/10.1201/b12444.
Full textPeltier, Thomas R., and Thomas R. Peltier. Information Security Risk Analysis. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9781420031195.
Full text