To see the other types of publications on this topic, follow the link: Security solutions.

Books on the topic 'Security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Hruska, Jan. Computer security solutions. Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

M, Jackson Keith, ed. Computer security solutions. CRC Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hruska, Jan. Computer security solutions. Blackwell Scientific, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mueller, John Paul. .NET Development Security Solutions. John Wiley & Sons, Ltd., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, NetLibrary, ed. Designing security architecture solutions. John Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. The Associated Chambers of Commerce and Industry of India, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. IBM, International Technical Support Organization, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. IBM, International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mason, Andrew G. Cisco secure Internet security solutions. Cisco Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mishra, Ashutosh, Mrinal Goswami, Manoj Kumar, and Navin Singh Rajput, eds. Hardware Security: Challenges and Solutions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-81213-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

DiNicolo, Dan. PC Magazine Windows XP Security Solutions. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tsacoumis, TP, ed. Access Security Screening: Challenges and Solutions. ASTM International, 1992. http://dx.doi.org/10.1520/stp1127-eb.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Diamond, Todd. Meskhetian Turks: Solutions and human security. The Open Society Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mishra, Binaya Kumar, Shamik Chakraborty, Pankaj Kumar, and Chitresh Saraswat. Sustainable Solutions for Urban Water Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53110-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

McClure, Stuart. Hacking exposed: Network security secrets & solutions. 5th ed. McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

DiNicolo, Dan. PC Magazine Windows Vista Security Solutions. John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Stuart, McClure, and Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2nd ed. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

International Business Machines Corporation. International Technical Support Organization, ed. Integrating IBM security and SAP solutions. IBM Corporation, International Technical Support Organization, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tursunov, Bakhrom. Security & stability in Uzbekistan: Challenges, threats & solutions. Conflict Studies Research Centre, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Das, Santosh Kumar, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, and Aboul Ella Hassanien, eds. Architectural Wireless Networks Solutions and Security Issues. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bailey, Carmen F. Analysis of security solutions in large enterprises. Naval Postgraduate School, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

World Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Fairmont Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hatch, Brian. Hacking Linux exposed: Linux security secrets & solutions. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hasseler, Bjorn. Security Solutions. 1632, Inc., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Helton, Rich, and Johennie Helton. Java Security Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Java Security Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mueller, John Paul. . NET Development Security Solutions. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mueller, John Paul. . Net Development Security Solutions. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mueller, John Paul. .NET Development Security Solutions. Sybex, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ramachandran, Jay. Designing Security Architecture Solutions. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Enterprise security architecture: Using IBM Tivoli security solutions. 4th ed. IBM International Technical Support Organization, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. Vervante, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Enterprise security architecture using IBM Tivoli security solutions. 2nd ed. IBM, International Technical Support Organization, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Redbooks, IBM. Enterprise Security Architecture Using IBM Tivoli Security Solutions. IBM.Com/Redbooks, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Enterprise security architecture using IBM ISS security solutions. IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Morgan, Patrick M. International Security: Problems and Solutions. CQ Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Diaz, Christopher. Database Security: Problems and Solutions. Mercury Learning & Information, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chappell, Caroline, and Judith Jeffcoate. Internet Security: Strategies and Solutions. Ovum Ltd, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bhaiji, Yusuf. Network Security Technologies and Solutions. Cisco Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ansari, Irshad Ahmad, and Varun Bajaj. Advanced Security Solutions for Multimedia. IOP Publishing, 2021. http://dx.doi.org/10.1088/978-0-7503-3735-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Nokia Network Security Solutions Handbook. Elsevier, 2002. http://dx.doi.org/10.1016/b978-1-931836-70-8.x5000-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!