Books on the topic 'Security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Mueller, John Paul. .NET Development Security Solutions. John Wiley & Sons, Ltd., 2006.
Find full textAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. The Associated Chambers of Commerce and Industry of India, 2011.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. IBM, International Technical Support Organization, 2007.
Find full textInternational Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. IBM, International Technical Support Organization, 2006.
Find full textSarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.
Full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textMishra, Ashutosh, Mrinal Goswami, Manoj Kumar, and Navin Singh Rajput, eds. Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2.
Full textDiNicolo, Dan. PC Magazine Windows XP Security Solutions. John Wiley & Sons, Ltd., 2005.
Find full textTsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.
Full textDiamond, Todd. Meskhetian Turks: Solutions and human security. The Open Society Institute, 1998.
Find full textMishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.
Full textMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. McGraw-Hill/Osborne, 2005.
Find full textDiNicolo, Dan. PC Magazine Windows Vista Security Solutions. John Wiley & Sons, Ltd., 2007.
Find full textStuart, McClure, and Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2nd ed. Osborne/McGraw-Hill, 2001.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Integrating IBM security and SAP solutions. IBM Corporation, International Technical Support Organization, 2012.
Find full textTursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Conflict Studies Research Centre, 1998.
Find full textDas, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.
Full textBailey, Carmen F. Analysis of security solutions in large enterprises. Naval Postgraduate School, 2003.
Find full textWorld Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Fairmont Press, 2003.
Find full textWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. McGraw-Hill, 2010.
Find full textHatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. Osborne/McGraw-Hill, 2001.
Find full textHelton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textDesigning Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2012.
Find full textMueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.
Find full textMueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.
Find full textRamachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture: Using IBM Tivoli security solutions. 4th ed. IBM International Technical Support Organization, 2006.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.
Find full textEnterprise security architecture using IBM Tivoli security solutions. 2nd ed. IBM, International Technical Support Organization, 2004.
Find full textRedbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.
Find full textEnterprise security architecture using IBM ISS security solutions. IBM, International Technical Support Organization, 2008.
Find full textMorgan, Patrick M. International Security: Problems and Solutions. CQ Press, 2006.
Find full textDiaz, Christopher. Database Security: Problems and Solutions. Mercury Learning & Information, 2022.
Find full textChappell, Caroline, and Judith Jeffcoate. Internet Security: Strategies and Solutions. Ovum Ltd, 1997.
Find full textAnsari, Irshad Ahmad, and Varun Bajaj. Advanced Security Solutions for Multimedia. IOP Publishing, 2021. http://dx.doi.org/10.1088/978-0-7503-3735-9.
Full textNokia Network Security Solutions Handbook. Elsevier, 2002. http://dx.doi.org/10.1016/b978-1-931836-70-8.x5000-5.
Full text