Books on the topic 'Security architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tudor, Jan Killmeyer. Information security architecture. Boca Raton, FL: Auerbach, 2000.
Find full textInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Find full textBrutschin, Elina. EU Gas Security Architecture. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51150-8.
Full textWang, Shuangbao Paul, and Robert S. Ledley, eds. Computer Architecture and Security. Singapore: John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118168851.
Full textEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Find full textInformation security architecture: An integrated approach to security organization. Boca Raton, FL: Auerbach, 2001.
Find full textWireless Internet security: Architecture and protocols. New York: Cambridge University Press, 2008.
Find full textCryptographic security architecture: Design and verification. New York: Springer, 2004.
Find full text1948-, Muftic Sead, ed. Security architecture for open distributed systems. Chichester: Wiley, 1993.
Find full textBacik, Sandy. Building an effective security policy architecture. Boca Raton: Auerbach Publications, 2008.
Find full textPlatform security: Software development using the Symbian OS security architecture. Hoboken, NJ: Wiley, 2006.
Find full textTudor, Jan Killmeyer. Information security architecture: An integrated approach to security in the organization. Boca Raton, FL: Auerbach Publications, 2006.
Find full text1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.
Find full textSingh, Amrit Pal, and United Service Institution of India, eds. Maoist insurgency and India's internal security architecture. New Delhi: United Service Institution of India, 2011.
Find full textBacik, Sandy. Building an effective information security policy architecture. Boca Raton: Auerbach Publications, 2008.
Find full textGuo, Song, and Deze Zeng, eds. Cyber-Physical Systems: Architecture, Security and Application. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-92564-6.
Full textKillmeyer, Jan. Information Security Architecture. Auerbach Publications, 2000. http://dx.doi.org/10.1201/9781420031034.
Full textKillmeyer, Jan. Information Security Architecture. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9780203488751.
Full textCryptographic Security Architecture. New York: Springer-Verlag, 2004. http://dx.doi.org/10.1007/b97264.
Full textSherwood, Nicholas A. Enterprise Security Architecture. Taylor & Francis Group, 2021.
Find full textSherwood, Nicholas A. Enterprise Security Architecture. Taylor & Francis Group, 2005.
Find full textNew Security Architecture For. Rowman & Littlefield Publishers, Incorporated, 2012.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textTiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Find full textTiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.
Find full textTiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.
Find full textTiller, James S. Adaptive Security Management Architecture. Auerbach Publications, 2010. http://dx.doi.org/10.1201/b10325.
Full textTan, See Seng. Multilateral Asian Security Architecture. Routledge, 2015. http://dx.doi.org/10.4324/9781315696782.
Full textTiller, James S., and Tiller S. Tiller. Adaptive Security Management Architecture. Taylor & Francis Group, 2010.
Find full textTiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.
Find full textSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.
Find full textWang, Shuangbao Paul. Computer Architecture and Organization: Fundamentals and Architecture Security. Springer Singapore Pte. Limited, 2021.
Find full textHelton. Java Application Security Architecture-apdf. Wiley & Sons, Incorporated, John, 2003.
Find full text