Books on the topic 'Security Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.
Full textBryan, Singer, ed. Industrial automation and process control security. CRC Press, 2012.
Find full textKrutz, Ronald L. Industrial automation and control system security principles. International Society of Automation (ISA), 2013.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textUnited States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textHuman behavior recognition technologies: Intelligent applications for monitoring and security. Information Science Reference, 2013.
Find full textBusiness data communications: Basic concepts, security and design. 4th ed. Wiley, 1993.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security and design. 2nd ed. Wiley, 1988.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security and design. 3rd ed. Wiley, 1990.
Find full textGarfinkel, Simson. RFID: Applications, security, and privacy. Addison-Wesley, 2006.
Find full textOffice, General Accounting. Electronic banking: Experiences reported by banks in implementing on-line banking : report to the Chairman, Committee on Banking and Financial Services, House of Representatives. The Office, 1998.
Find full textKrzysztof, Iniewski, ed. Smart grid: Applications, communications, and security. Wiley, 2012.
Find full textGanapathi, Geetha, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, and Periakaruppan Ramanathan, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0716-4.
Full textBalusamy, Suresh, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, and B. Malar, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8.
Full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.
Find full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.
Find full textUnited States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 3rd ed. Wiley, 1990.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 2nd ed. Wiley, 1988.
Find full textFitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 4th ed. Wiley, 1993.
Find full textJoe, Weiss, California Energy Commission. Public Interest Energy Research., and KEMA (Firm), eds. Cyber security research and development: Interim PIER project report. California Energy Commission, 2008.
Find full textJoe, Weiss, California Energy Commission. Public Interest Energy Research., and KEMA (Firm), eds. Cyber security research and development: Interim PIER project report. California Energy Commission, 2008.
Find full textHoffmann, Mario. Willenserklärungen im Internet: Rechtssicherheit durch elektronische Signaturen sowie Anpassung der Formvorschriften und des Beweisrechts. Dr. Kovač, 2003.
Find full textBaranov, A. K. Informat͡s︡ionno-vychislitelʹnye seti organov vnutrennikh del: Uchebnoe posobie. Akademii͡a︡ MVD RF, 1994.
Find full textSifflard, James A. Conforming your conveyancing practice to the new data security laws & regulations. MCLE, 2010.
Find full textNational Institute of Standards and Technology (U.S.), ed. The technical specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.0: Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
Find full textOffice, General Accounting. Information technology management: Social Security Administration practices can be improved : report to the Chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. GAO, 2001.
Find full textOffice, General Accounting. Global financial markets: International coordination can help address automation risks : report to Congressional Oversight Committees. The Office, 1991.
Find full textA, Di Giandomenico Robert, and Linde Carl W, eds. Understanding building automation systems: Direct digital control, energy management, life safety, security/access control, lighting, building management programs. R.S. Means Co., 1991.
Find full textInstitute, Pennsylvania Bar, ed. Securing correspondence. Pennsylvania Bar Institute, 2006.
Find full textEssinger, James. Banking technology as a competitive weapon. FT FinancialPub., 1994.
Find full textJames, Essinger, and Pearson Professional Ltd, eds. Banking technology as a competitive weapon 1997: Winning strategies explained. 3rd ed. Pearson Professional Ltd, 1996.
Find full textMünchen, Universität der Bundeswehr. Verteilte intelligente Mikrosysteme für den privaten Lebensbereich: VIMP : Verbundprojekt im Rahmen des BMBF-Forderungsschwerpunkts Mikrosystemtechnik : Abschlussseminar. Univ. der Bundeswehr München, 1999.
Find full textUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. President's stimulus and investment proposals affecting the Social Security Administration: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Third Congress, first session, March 25, 1993. U.S. G.P.O., 1993.
Find full textUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. President's stimulus and investment proposals affecting the Social Security Administration: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Third Congress, first session, March 25, 1993. U.S. G.P.O., 1993.
Find full textNeittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2015.
Find full textNeittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2016.
Find full textPriyam, Prashant. Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. Packt Publishing, 2018.
Find full textSandage, Tim, and Ted Steffan. AWS Security Automation and Orchestration: Modernizing Governance Through Security Design. O'Reilly Media, Incorporated, 2019.
Find full text