Libri sul tema "CyberSecurty"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "CyberSecurty".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Testo completoBrooks, Charles J., Christopher Grow, Philip Craig e Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Testo completoKumar, Gautam, Om Prakash Singh e Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Testo completoAbd El-Latif, Ahmed A., e Christos Volos, a cura di. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Testo completoDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams e Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.
Testo completoConti, Mauro, Gaurav Somani e Radha Poovendran, a cura di. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.
Testo completoWaschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.
Testo completoAyala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.
Testo completoBeissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.
Testo completoKaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran e Alan Marcus, a cura di. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.
Testo completoPatterson, Wayne, e Cynthia E. Winston-Proctor. Behavioral Cybersecurity. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484.
Testo completoKosseff, Jeff. Cybersecurity Law. Hoboken, New Jersey: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119231899.
Testo completoPatterson, Wayne, e Cynthia E. Winston-Proctor. Behavioral Cybersecurity. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029.
Testo completoVerma, Rakesh M., e David J. Marchette. Cybersecurity Analytics. Boca Raton, FL : CRC Press, 2020. | Series: Chapman & Hall/CRC data science series: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429326813.
Testo completoWurm, Manuel. Automotive Cybersecurity. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64228-3.
Testo completoVanuatu. National cybersecurity policy. Port Vila, Vanuatu]: [Republic of Vanuatu], 2013.
Cerca il testo completoLee, Newton. Counterterrorism and Cybersecurity. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17244-6.
Testo completoLee, Newton. Counterterrorism and Cybersecurity. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7205-6.
Testo completoDunn Cavelty, Myriam. Cybersecurity in Switzerland. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10620-5.
Testo completoBaumard, Philippe. Cybersecurity in France. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6.
Testo completoIorliam, Aamo. Cybersecurity in Nigeria. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15210-9.
Testo completoTabansky, Lior, e Isaac Ben Israel. Cybersecurity in Israel. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4.
Testo completoAustin, Greg. Cybersecurity in China. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9.
Testo completoThompson, Eric C. Cybersecurity Incident Response. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3870-7.
Testo completoOakley, Jacob G. Cybersecurity for Space. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5732-6.
Testo completoSikos, Leslie F., a cura di. AI in Cybersecurity. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-98842-9.
Testo completoTouhill, Gregory J., e C. Joseph Touhill. Cybersecurity for Executives. Hoboken, NJ: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118908785.
Testo completoSchallbruch, Martin, e Isabel Skierka. Cybersecurity in Germany. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90014-8.
Testo completoBartsch, Michael, e Stefanie Frey, a cura di. Cybersecurity Best Practices. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9.
Testo completoMillett, Lynette I., Baruch Fischhoff e Peter J. Weinberger, a cura di. Foundational Cybersecurity Research. Washington, D.C.: National Academies Press, 2017. http://dx.doi.org/10.17226/24676.
Testo completoMongeau, Scott, e Andrzej Hajdasinski. Cybersecurity Data Science. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74896-8.
Testo completoChałubińska-Jentkiewicz, Katarzyna, Filip Radoniewicz e Tadeusz Zieliński, a cura di. Cybersecurity in Poland. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78551-2.
Testo completoSeguridad en redes. Madrid, Spain: DarFe Learning Consulting, S. L., 2016.
Cerca il testo completoJohnson, Thomas A., a cura di. Cybersecurity. Routledge, 2015. http://dx.doi.org/10.1201/b18335.
Testo completoAndreasson, Kim. Cybersecurity. A cura di Kim J. Andreasson. CRC Press, 2011. http://dx.doi.org/10.1201/b11363.
Testo completoKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2017.
Cerca il testo completoMarchette, David J., e Rakesh M. Verma. Cybersecurity Analytics. Taylor & Francis Group, 2019.
Cerca il testo completoKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2019.
Cerca il testo completoMarchette, David J., e Rakesh M. Verma. Cybersecurity Analytics. CRC Press LLC, 2020.
Cerca il testo completoKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2019.
Cerca il testo completoMarchette, David J., e Rakesh M. Verma. Cybersecurity Analytics. Taylor & Francis Group, 2019.
Cerca il testo completoCapitano, Madison. Cybersecurity Experts. Rourke Educational Media, 2020.
Cerca il testo completoKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2017.
Cerca il testo completo