Libros sobre el tema "Computer security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Computer security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Pamela, Kane, ed. Compute!'s computer security. Greensboro, N.C: Compute! Books, 1989.
Buscar texto completoW, Roberts D. Computer security. London: Blenheim Online Publications, 1990.
Buscar texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, and Christos Kalloniatis, eds. Computer Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12786-2.
Texto completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2.
Texto completoFournaris, Apostolos P., Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2.
Texto completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1.
Texto completoLopez, Javier, Jianying Zhou, and Miguel Soriano, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6.
Texto completoBoureanu, Ioana, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, et al., eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3.
Texto completoKatsikas, Sokratis K., Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, and Stefanos Gritzalis, eds. Computer Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72817-9.
Texto completoKatsikas, Sokratis, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, and Steven Furnell, eds. Computer Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0.
Texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1986.
Buscar texto completoCarroll, John Millar. Computer security. 2nd ed. Boston: Butterworths, 1987.
Buscar texto completoBooks, Time-Life, ed. Computer security. Alexandria, Va: Time-Life Books, 1990.
Buscar texto completoBulmer, O. F. Computer security. [London]: Institute of Chartered Accountants in England and Wales, 1988.
Buscar texto completoHollmann, Pauline. Computer security. Washington, D.C: Science Reference Section, Science and Technology Division, Library of Congress, 1985.
Buscar texto completo(Firm), Shotlist, Films for the Humanities (Firm), and BDP Media Solutions (Firm), eds. Computer security. Princeton, NJ: Films for the Humanities & Sciences, 2001.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.
Texto completoRak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.
Texto completoGorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.
Texto completoGorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.
Texto completoWang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.
Texto completoKotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.
Texto completoBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118820650.
Texto completoKizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.
Texto completoGorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.
Texto completoBosworth, Seymour, Michel E. Kabay, and Eric Whyne, eds. Computer Security Handbook. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118851678.
Texto completoForcht, Karen Anne. Computer security management. Danvers, Mass: Boyd & Fraser, 1994.
Buscar texto completoSeymour, Bosworth, Kabay Michel E, and Whyne Eric 1981-, eds. Computer security handbook. 5th ed. Hoboken, N.J: John Wiley & Sons, 2009.
Buscar texto completoDeborah, Russell, Gangemi G. T, and Russell Deborah, eds. Computer Security Basics. 2nd ed. Sebastopol, CA: O'Reilly & Associates, 2006.
Buscar texto completoM, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Buscar texto completoWilma, Caldwell, ed. Computer security sourcebook. Detroit, MI: Omnigraphics, 2003.
Buscar texto completoinc, International Resource Development, ed. Computer security markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.
Buscar texto completoRussell, Deborah. Computer security basics. Sebastopol, Calif: O'Reilly, 1991.
Buscar texto completoE, Hutt Arthur, Bosworth Seymour, and Hoyt Douglas B, eds. Computer security handbook. 3rd ed. New York: Wiley, 1995.
Buscar texto completoWatt, Steve. Computer security manager. Oxford, Eng: Elsevier Advanced Technology in association with Alkemi Ltd, 1989.
Buscar texto completoRussell, Deborah. Computer Security Basics. Cambridge, MA: O'Reilly & Associates, 1992.
Buscar texto completoBaker, Richard H. Computer security handbook. 2nd ed. Blue Ridge Summit, PA: TAB Professional and Reference Books, 1991.
Buscar texto completoHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Buscar texto completoBOOKS, Editors of TIME-LIFE. Computer Security (Understanding Computers). Time Life UK, 1987.
Buscar texto completoDu, Wenliang. Computer Security. 3rd ed. WORLD SCIENTIFIC, 2022. http://dx.doi.org/10.1142/13053.
Texto completoGollmann, Dieter. Computer Security. Wiley & Sons, Incorporated, John, 2007.
Buscar texto completoBrown, Lawrie, and William Stallings. Computer Security. Pearson Education, Limited, 2018.
Buscar texto completo