To see the other types of publications on this topic, follow the link: Security architecture.

Books on the topic 'Security architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Huisken, Ron. Architecture of Security. Canberra: ANU Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tudor, Jan Killmeyer. Information security architecture. Boca Raton, FL: Auerbach, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brutschin, Elina. EU Gas Security Architecture. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51150-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Shuangbao Paul, and Robert S. Ledley, eds. Computer Architecture and Security. Singapore: John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118168851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Network security architectures. Indianapolis, IN: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Information security architecture: An integrated approach to security organization. Boca Raton, FL: Auerbach, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wireless Internet security: Architecture and protocols. New York: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cryptographic security architecture: Design and verification. New York: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

1948-, Muftic Sead, ed. Security architecture for open distributed systems. Chichester: Wiley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bacik, Sandy. Building an effective security policy architecture. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Platform security: Software development using the Symbian OS security architecture. Hoboken, NJ: Wiley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tudor, Jan Killmeyer. Information security architecture: An integrated approach to security in the organization. Boca Raton, FL: Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Singh, Amrit Pal, and United Service Institution of India, eds. Maoist insurgency and India's internal security architecture. New Delhi: United Service Institution of India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bacik, Sandy. Building an effective information security policy architecture. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Guo, Song, and Deze Zeng, eds. Cyber-Physical Systems: Architecture, Security and Application. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-92564-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Killmeyer, Jan. Information Security Architecture. Auerbach Publications, 2000. http://dx.doi.org/10.1201/9781420031034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Killmeyer, Jan. Information Security Architecture. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9780203488751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cryptographic Security Architecture. New York: Springer-Verlag, 2004. http://dx.doi.org/10.1007/b97264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sherwood, Nicholas A. Enterprise Security Architecture. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sherwood, Nicholas A. Enterprise Security Architecture. Taylor & Francis Group, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

New Security Architecture For. Rowman & Littlefield Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Tiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Tiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tiller, James S. Adaptive Security Management Architecture. Auerbach Publications, 2010. http://dx.doi.org/10.1201/b10325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tan, See Seng. Multilateral Asian Security Architecture. Routledge, 2015. http://dx.doi.org/10.4324/9781315696782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Tiller, James S., and Tiller S. Tiller. Adaptive Security Management Architecture. Taylor & Francis Group, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tiller, James S. Adaptive Security Management Architecture. Auerbach Publishers, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Schoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Schoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Enterprise security architecture using IBM Tivoli security solutions. 2nd ed. [San Jose, Calif.]: IBM, International Technical Support Organization, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Enterprise security architecture: Using IBM Tivoli security solutions. 4th ed. [Poughkeepsie, NY]: IBM International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Shuangbao Paul. Computer Architecture and Organization: Fundamentals and Architecture Security. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Insider's Guide to Cyber Security Architecture. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Emerging Security Architecture in Africa. Centre for Policy Studies, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Helton. Java Application Security Architecture-apdf. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Madsen, Tom. Security Architecture - How and Why. River Publishers, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Madsen, Tom. Security Architecture - How and Why. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography