Books on the topic 'Security systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Tripathy, Somanath, Rudrapatna K. Shyamasundar, and Rajiv Ranjan, eds. Information Systems Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0.
Full textGanapathy, Vinod, Trent Jaeger, and R. K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6.
Full textPrakash, Atul, and Rudrapatna Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1.
Full textGarg, Deepak, N. V. Narendra Kumar, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3.
Full textVenkatakrishnan, Venkat, and Diganta Goswami, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3.
Full textRay, Indrajit, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, and V. Kamakoti, eds. Information Systems Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5.
Full textShyamasundar, Rudrapatna K., Virendra Singh, and Jaideep Vaidya, eds. Information Systems Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7.
Full textJajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1.
Full textPrakash, Atul, and Indranil Sen Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6.
Full textJha, Somesh, and Anish Mathuria, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17714-9.
Full textBagchi, Aditya, and Vijayalakshmi Atluri, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635.
Full textBagchi, Aditya, and Indrakshi Ray, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8.
Full textMcDaniel, Patrick, and Shyam K. Gupta, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2.
Full textKatsikas, Sokratis K., and Dimitris Gritzalis, eds. Information Systems Security. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0.
Full textKanhere, Salil, Vishwas T. Patil, Shamik Sural, and Manoj S. Gaur, eds. Information Systems Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2.
Full textSekar, R., and Arun K. Pujari, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7.
Full textJajodia, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980.
Full textJajoda, Sushil, and Chandan Mazumdar, eds. Information Systems Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0.
Full textBadarla, Venkata Ramana, Surya Nepal, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7.
Full textAmerican Bar Association. Tort and Insurance Practice Section. and American Bar Association. Tort and Insurance Practice Section. Meeting, eds. Security systems litigation. [Chicago, Ill.]: American Bar Association, 1994.
Find full textMcDougall, Allan. Transportation systems security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2008.
Find full textNational Institute of Standards and Technology (U.S.), ed. Information systems security. [Washington, D.C.?]: The Institute, 1994.
Find full textMuthukkumarasamy, Vallipuram, Sithu D. Sudarsan, and Rudrapatna K. Shyamasundar, eds. Information Systems Security. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6.
Full textGlenn, Brunette, ed. Securing systems with the Solaris security toolkit. Santa Clara, Calif: Sun Microsystems, 2003.
Find full textWilliams, Godfried B. Online Business Security Systems. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68850-3.
Full textKoç, Çetin Kaya, ed. Cyber-Physical Systems Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8.
Full textPande, Amit, and Joseph Zambreno. Embedded Multimedia Security Systems. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4459-5.
Full textKotulski, Zbigniew, Bogdan Księżopolski, and Katarzyna Mazur, eds. Cryptography and Security Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44893-9.
Full textT, Pritchard J. A., ed. Security in office systems. Manchester, England: NCC Publications, 1987.
Find full textPolice, Royal Canadian Mounted. Small systems security guidelines. [Ottawa]: Royal Canadian Mounted Police, 1992.
Find full textOlayiwole, G. F. J. Comp uter systems security. London: University of East London, 1992.
Find full textR, Bagwill, Barkley John, and National Institute of Standards and Technology (U.S.), eds. Security in open systems. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1994.
Find full textMuftic, Sead. Security in IBM systems. Holtsville, N.Y., U.S.A: Computer Technology Research Corp., 1990.
Find full textR, Bagwill, and National Institute of Standards and Technology (U.S.), eds. Security in open systems. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textMarketing Strategies for Industry (UK) Ltd. Security alarms & systems, UK. Mitcham: MSI, 1985.
Find full textCanada. Treasury Board. (Royal Canadian Mounted Police). Small systems security guidelines. Ottawa: Treasury Board, 1992.
Find full textMSI Marketing Research for Industry Ltd., ed. Electronic security systems: Germany. Saltney: MSI, 1998.
Find full textMarketing Strategies for Industry (UK) Ltd., ed. Security alarms & systems UK. Mitcham: Marketing Strategies for Industry (UK) Ltd, 1986.
Find full textPolice, Royal Canadian Mounted. Small systems security guidelines. [Ottawa]: Royal Canadian Mounted Police, 1992.
Find full textBailin, Paul, and Rebecca L. Friedman. Security surveillance & monitoring systems. Cleveland, Ohio: Freedonia Group, 1998.
Find full textPaul, Bailin, Toto Elissa, and Freedonia Group, eds. World security products & systems. Cleveland: Freedonia Group, 2001.
Find full textBailin, Paul, and Rebecca L. Friedman. World security products & systems. Cleveland: Freedonia Group, 1999.
Find full textRan, Giladi, Serpanos Dimitrios Nikolaou, and NATO Advanced Research Workshop on Security and Embedded Systems (2005 August 22-26 : Patras, Greece), eds. Security and embedded systems. Amsterdam: IOS Press, 2006.
Find full textEloff, Jan H. P., Les Labuschagne, Rossouw von Solms, and Jan Verschuren, eds. Information Security Management & Small Systems Security. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7.
Full textMarkus, Schumacher, ed. Security patterns: Integrating security and systems engineering. Hoboken, NJ: Wiley, 2005.
Find full textKhairallah, Michael. Physical security systems handbook: The design and implementation of electronic security systems. Oxford: Butterworth-Heinemann, 2005.
Find full textBuilding Services Research and Information Association., ed. Security Systems. 2nd ed. Bracknell, Berks, 1985.
Find full textStaff, Red Dot Publications, and Department Of DEFENSE. Electronic Security Systems: Security Engineering. Independently Published, 2017.
Find full text