To see the other types of publications on this topic, follow the link: Security Automation.

Books on the topic 'Security Automation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security Automation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bryan, Singer, ed. Industrial automation and process control security. CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krutz, Ronald L. Industrial automation and control system security principles. International Society of Automation (ISA), 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Soper, Mark Edward. Absolute beginner's guide to home automation. Que, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Division, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Human behavior recognition technologies: Intelligent applications for monitoring and security. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Girardin, Pierre. La domotique. Société d'habitation du Québec, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Frank, Thornton, and Kleinschmidt John, eds. RFID security. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Business data communications: Basic concepts, security and design. 4th ed. Wiley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

FitzGerald, Jerry. Business data communications: Basic concepts, security and design. 2nd ed. Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

FitzGerald, Jerry. Business data communications: Basic concepts, security and design. 3rd ed. Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Computer audit, control, and security. Wiley, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Garfinkel, Simson. RFID: Applications, security, and privacy. Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Office, General Accounting. Electronic banking: Experiences reported by banks in implementing on-line banking : report to the Chairman, Committee on Banking and Financial Services, House of Representatives. The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Krzysztof, Iniewski, ed. Smart grid: Applications, communications, and security. Wiley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Security, audit and control features: SAP ERP. 3rd ed. ISACA, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ganapathi, Geetha, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, and Periakaruppan Ramanathan, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0716-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Balusamy, Suresh, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, and B. Malar, eds. Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

United States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

United States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

United States. Congress. House. Committee on Ways and Means. 2-year extension of automation deadline: Report (to accompany H.R. 2288) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Eric, Faulkner, ed. Home hacking projects for geeks. O'Reilly Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

FitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 3rd ed. Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

FitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 2nd ed. Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

FitzGerald, Jerry. Business data communications: Basic concepts, security, and design. 4th ed. Wiley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Joe, Weiss, California Energy Commission. Public Interest Energy Research., and KEMA (Firm), eds. Cyber security research and development: Interim PIER project report. California Energy Commission, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Joe, Weiss, California Energy Commission. Public Interest Energy Research., and KEMA (Firm), eds. Cyber security research and development: Interim PIER project report. California Energy Commission, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hoffmann, Mario. Willenserklärungen im Internet: Rechtssicherheit durch elektronische Signaturen sowie Anpassung der Formvorschriften und des Beweisrechts. Dr. Kovač, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Baranov, A. K. Informat͡s︡ionno-vychislitelʹnye seti organov vnutrennikh del: Uchebnoe posobie. Akademii͡a︡ MVD RF, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sifflard, James A. Conforming your conveyancing practice to the new data security laws & regulations. MCLE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

National Institute of Standards and Technology (U.S.), ed. The technical specification for the Security Content Automation Protocol (SCAP); SCAP Version 1.0: Recommendations of the National Institute of Standards and Technology. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Office, General Accounting. Information technology management: Social Security Administration practices can be improved : report to the Chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. GAO, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Office, General Accounting. Global financial markets: International coordination can help address automation risks : report to Congressional Oversight Committees. The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

A, Di Giandomenico Robert, and Linde Carl W, eds. Understanding building automation systems: Direct digital control, energy management, life safety, security/access control, lighting, building management programs. R.S. Means Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Institute, Pennsylvania Bar, ed. Securing correspondence. Pennsylvania Bar Institute, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Essinger, James. Banking technology as a competitive weapon. FT FinancialPub., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

J, Velte Toby, ed. Build your own smart home. McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

James, Essinger, and Pearson Professional Ltd, eds. Banking technology as a competitive weapon 1997: Winning strategies explained. 3rd ed. Pearson Professional Ltd, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

München, Universität der Bundeswehr. Verteilte intelligente Mikrosysteme für den privaten Lebensbereich: VIMP : Verbundprojekt im Rahmen des BMBF-Forderungsschwerpunkts Mikrosystemtechnik : Abschlussseminar. Univ. der Bundeswehr München, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

United States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. President's stimulus and investment proposals affecting the Social Security Administration: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Third Congress, first session, March 25, 1993. U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

United States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. President's stimulus and investment proposals affecting the Social Security Administration: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Third Congress, first session, March 25, 1993. U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Security Automation Essentials. McGraw-Hill/Osborne Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Cyber Security: Analytics, Technology and Automation. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Neittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Neittaanmäki, Pekka, and Martti Lehto. Cyber Security: Analytics, Technology and Automation. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Priyam, Prashant. Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sandage, Tim, and Ted Steffan. AWS Security Automation and Orchestration: Modernizing Governance Through Security Design. O'Reilly Media, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!