Libros sobre el tema "Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Poindexter, John M. Regional security, collective security, and American security. U.S. Dept. of State, Bureau of Public Affairs, 1986.
Buscar texto completoTeh, Benny Cheng Guan. Human security: Securing East Asia's future. Springer, 2012.
Buscar texto completoJarvis, Lee, and Jack Holland. Security. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-0-230-39197-0.
Texto completoBourbeau, Philippe, ed. Security. Cambridge University Press, 2015. http://dx.doi.org/10.1017/cbo9781316227671.
Texto completoOffice, National Preservation. Security. National Preservation Office, 1989.
Buscar texto completoChartered Institute of Public Finance and Accountancy., ed. Security. Chartered Institute of Public Finance and Accountancy, 1991.
Buscar texto completoNational Examining Board for Supervisory Management., ed. Security. 2nd ed. Pergamon Open Learning, 1991.
Buscar texto completoBelinda, Fairthorne, and ICL Open Systems Architecture Group., eds. Security. Prentice-Hall, 1993.
Buscar texto completoHong, Yong-Pyo. State Security and Regime Security. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.
Texto completoMacKinnon, Lachlan M., ed. Data Security and Security Data. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25704-9.
Texto completoDefense, U. S. Dept of. Information security program regulation: Security. Dept. of Defense, 1995.
Buscar texto completoMukute, Mutizwa, D. Mnyulwa, and Sarah Kimakwa. Seed security for food security. PELUM Association, 2002.
Buscar texto completo1949-, Hawkes Kenneth Gale, and United States. Dept. of Transportation, eds. Port security: Security force management. U.S. Dept. of Transportation, 1998.
Buscar texto completoEidgenössische Technische Hochschule Zürich. Forschungsstelle für Sicherheitspolitik, ed. Securing Europe?: Implementing the European security strategy. Center for Security Studies, 2006.
Buscar texto completoMendez, Yosuet Cordero. Sulery: Securing Security. Independently Published, 2019.
Buscar texto completoWeiss, Martin, Shon Harris, Diane Barrett, David R. Miller, and Kirk Hausman. CompTIA Security+; Security+. Pearson Education, Limited, 2010.
Buscar texto completoLaird, Douglas R. Aviation Security (Securing Our Nation). Chelsea House Publications, 2003.
Buscar texto completoCronin, Bruce. Security Regimes: Collective Security and Security Communities. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.296.
Texto completoOperations, Logical Logical. *executrain Sm : Security+: Security+. Logical Operations LLC, 2005.
Buscar texto completoDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications, 2018.
Buscar texto completoHoesing, Michael T. Virtualization Security: Securing VMWare, XenEnterprise, VirtualIron. Wiley, 2008.
Buscar texto completoVehent, Julien. Securing DevOps: Security in the Cloud. Manning Publications Co. LLC, 2018.
Buscar texto completoRaam, Giridhara. Securing Endpoints to Improve IT Security. Independently Published, 2018.
Buscar texto completoGuan, Benny Teh Cheng. Human Security: Securing East Asia's Future. Springer, 2014.
Buscar texto completoSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Buscar texto completoPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Buscar texto completoPublishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.
Buscar texto completoZedner, Lucia. Security. Routledge, 2009. http://dx.doi.org/10.4324/9780203871133.
Texto completoSecurity. Cambridge University Press, 2022. http://dx.doi.org/10.1017/9781009270113.
Texto completoPurpura, Philip P. Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781439894569.
Texto completoSecurity. Published for the National Examining Board for Supervisory Management by Pergamon Open Learning, 1990.
Buscar texto completoAnderson, Poul. Security. CreateSpace Independent Publishing Platform, 2016.
Buscar texto completoKrause, Keith, and Michael Williams. Security. Cambridge University Press, 2002.
Buscar texto completo