|
Practical unix and internet security |
||||
APA | (1996). Practical unix and internet security, Bonn: O'Reilly and associates, Inc.. | ||||
MLA | Practical unix and internet security. Bonn: O'Reilly and associates, Inc., 1996. | ||||
Harvard | 1996. Practical unix and internet security. O'Reilly and associates, Inc., | ||||
Chicago | Practical unix and internet security. O'Reilly and associates, Inc., 1996. | ||||
|
Computer security handbook |
||||
APA | (1988). Computer security handbook, New York: Macmillan. | ||||
MLA | Computer security handbook. New York: Macmillan, 1988. | ||||
Harvard | 1988. Computer security handbook. Macmillan, | ||||
Chicago | Computer security handbook. Macmillan, 1988. | ||||
|
Computer security basics |
||||
APA | (1991). Computer security basics, Sebastopol: O'Reilly & Associates. | ||||
MLA | Computer security basics. Sebastopol: O'Reilly & Associates, 1991. | ||||
Harvard | 1991. Computer security basics. O'Reilly & Associates, | ||||
Chicago | Computer security basics. O'Reilly & Associates, 1991. | ||||
|
Unix system security: how to protect your data and prevent intruders |
||||
APA | (1990). Unix system security: how to protect your data and prevent intruders, Reading, Massachusetts: Addison-Wesley. | ||||
MLA | Unix system security: how to protect your data and prevent intruders. Reading, Massachusetts: Addison-Wesley, 1990. | ||||
Harvard | 1990. Unix system security: how to protect your data and prevent intruders. Addison-Wesley, | ||||
Chicago | Unix system security: how to protect your data and prevent intruders. Addison-Wesley, 1990. | ||||
|
applied cryptography: protocols, algorithms, and source code in C |
||||
APA | (1996). applied cryptography: protocols, algorithms, and source code in C, N.Y: John Wiley & Sons. | ||||
MLA | applied cryptography: protocols, algorithms, and source code in C. N.Y: John Wiley & Sons, 1996. | ||||
Harvard | 1996. applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, | ||||
Chicago | applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, 1996. | ||||
|
The stephen cobb complete book of PC and LAN security |
||||
APA | (1990). The stephen cobb complete book of PC and LAN security, N.Y: Windcrest. | ||||
MLA | The stephen cobb complete book of PC and LAN security. N.Y: Windcrest, 1990. | ||||
Harvard | 1990. The stephen cobb complete book of PC and LAN security. Windcrest, | ||||
Chicago | The stephen cobb complete book of PC and LAN security. Windcrest, 1990. | ||||
|
Unix security for the organization |
||||
APA | (1994). Unix security for the organization, Indianapolis: Sams publishing. | ||||
MLA | Unix security for the organization. Indianapolis: Sams publishing, 1994. | ||||
Harvard | 1994. Unix security for the organization. Sams publishing, | ||||
Chicago | Unix security for the organization. Sams publishing, 1994. | ||||
|
Java security |
||||
APA | (1996). Java security, New York: John Wiley & Sons. | ||||
MLA | Java security. New York: John Wiley & Sons, 1996. | ||||
Harvard | 1996. Java security. John Wiley & Sons, | ||||
Chicago | Java security. John Wiley & Sons, 1996. | ||||
|
Fundamentals of computer security technology |
||||
APA | (1994). Fundamentals of computer security technology, New Jersey: Prentice Hall. | ||||
MLA | Fundamentals of computer security technology. New Jersey: Prentice Hall, 1994. | ||||
Harvard | 1994. Fundamentals of computer security technology. Prentice Hall, | ||||
Chicago | Fundamentals of computer security technology. Prentice Hall, 1994. | ||||
|
Security in computing |
||||
APA | (1997). Security in computing, Upper Saddle River, New Jersey: Prentice Hall. | ||||
MLA | Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 1997. | ||||
Harvard | 1997. Security in computing. Prentice Hall, | ||||
Chicago | Security in computing. Prentice Hall, 1997. | ||||
|
Cryptography and network security : principles and practice |
||||
APA | (1998). Cryptography and network security : principles and practice, Upper Saddle River, New Jersey: Prentice Hall. | ||||
MLA | Cryptography and network security : principles and practice. Upper Saddle River, New Jersey: Prentice Hall, 1998. | ||||
Harvard | 1998. Cryptography and network security : principles and practice. Prentice Hall, | ||||
Chicago | Cryptography and network security : principles and practice. Prentice Hall, 1998. | ||||
|
Introduction to data security and controls |
||||
APA | (1982). Introduction to data security and controls, Wellesley, Massachusetts: Q.E.D. Information Science, INC.. | ||||
MLA | Introduction to data security and controls. Wellesley, Massachusetts: Q.E.D. Information Science, INC., 1982. | ||||
Harvard | 1982. Introduction to data security and controls. Q.E.D. Information Science, INC., | ||||
Chicago | Introduction to data security and controls. Q.E.D. Information Science, INC., 1982. | ||||
|
Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997 |
||||
APA | (1997). Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997, Berlin: Springer - Verlag. | ||||
MLA | Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Berlin: Springer - Verlag, 1997. | ||||
Harvard | 1997. Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag, | ||||
Chicago | Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag, 1997. | ||||
|
Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996 |
||||
APA | (1997). Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996, Berlin: Springer - Verlag. | ||||
MLA | Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Berlin: Springer - Verlag, 1997. | ||||
Harvard | 1997. Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag, | ||||
Chicago | Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag, 1997. | ||||
|
Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998 |
||||
APA | (1998). Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998, Berlin: Springer - Verlag. | ||||
MLA | Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Berlin: Springer - Verlag, 1998. | ||||
Harvard | 1998. Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag, | ||||
Chicago | Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag, 1998. | ||||
|
Digital signature schemes: general framework and fail-stop signatures |
||||
APA | (1996). Digital signature schemes: general framework and fail-stop signatures, Berlin: Springer - Verlag. | ||||
MLA | Digital signature schemes: general framework and fail-stop signatures. Berlin: Springer - Verlag, 1996. | ||||
Harvard | 1996. Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag, | ||||
Chicago | Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag, 1996. | ||||
|
Hacking exposed: network security, secrets and solutions |
||||
APA | (2001). Hacking exposed: network security, secrets and solutions, Berkeley: Osborne/ McGraw - Hill. | ||||
MLA | Hacking exposed: network security, secrets and solutions. Berkeley: Osborne/ McGraw - Hill, 2001. | ||||
Harvard | 2001. Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill, | ||||
Chicago | Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill, 2001. | ||||
|
MCSE: windows 2000 network security design: exam notes |
||||
APA | (2001). MCSE: windows 2000 network security design: exam notes, San Francisco: SYBEX. | ||||
MLA | MCSE: windows 2000 network security design: exam notes. San Francisco: SYBEX, 2001. | ||||
Harvard | 2001. MCSE: windows 2000 network security design: exam notes. SYBEX, | ||||
Chicago | MCSE: windows 2000 network security design: exam notes. SYBEX, 2001. | ||||
|
Windows 2000 security handbook |
||||
APA | (2001). Windows 2000 security handbook, Berkeley, California: Osborne/ McGraw - Hill. | ||||
MLA | Windows 2000 security handbook. Berkeley, California: Osborne/ McGraw - Hill, 2001. | ||||
Harvard | 2001. Windows 2000 security handbook. Osborne/ McGraw - Hill, | ||||
Chicago | Windows 2000 security handbook. Osborne/ McGraw - Hill, 2001. | ||||
|
Java security handbook |
||||
APA | (2000). Java security handbook, Indianapolis, Indiana: SAMS. | ||||
MLA | Java security handbook. Indianapolis, Indiana: SAMS, 2000. | ||||
Harvard | 2000. Java security handbook. SAMS, | ||||
Chicago | Java security handbook. SAMS, 2000. | ||||
|
Windows 2000 user management |
||||
APA | (2000). Windows 2000 user management, Indianapolis, Indiana: New Riders. | ||||
MLA | Windows 2000 user management. Indianapolis, Indiana: New Riders, 2000. | ||||
Harvard | 2000. Windows 2000 user management. New Riders, | ||||
Chicago | Windows 2000 user management. New Riders, 2000. | ||||
|
Hacker attack |
||||
APA | (2000). Hacker attack, San Francisco: SYBEX. | ||||
MLA | Hacker attack. San Francisco: SYBEX, 2000. | ||||
Harvard | 2000. Hacker attack. SYBEX, | ||||
Chicago | Hacker attack. SYBEX, 2000. | ||||
|
Protecting your web site with firewalls |
||||
APA | (1997). Protecting your web site with firewalls, Upper Saddle River, New Jersey: Prentice - Hall. | ||||
MLA | Protecting your web site with firewalls. Upper Saddle River, New Jersey: Prentice - Hall, 1997. | ||||
Harvard | 1997. Protecting your web site with firewalls. Prentice - Hall, | ||||
Chicago | Protecting your web site with firewalls. Prentice - Hall, 1997. | ||||
|
Firewalls : a complete guide |
||||
APA | (2000). Firewalls : a complete guide, New York: McGraw - Hill. | ||||
MLA | Firewalls : a complete guide. New York: McGraw - Hill, 2000. | ||||
Harvard | 2000. Firewalls : a complete guide. McGraw - Hill, | ||||
Chicago | Firewalls : a complete guide. McGraw - Hill, 2000. | ||||
|
Practical firewalls |
||||
APA | (2000). Practical firewalls, Indianapolis, Indiana: Que. | ||||
MLA | Practical firewalls. Indianapolis, Indiana: Que, 2000. | ||||
Harvard | 2000. Practical firewalls. Que, | ||||
Chicago | Practical firewalls. Que, 2000. | ||||
|
Developing secure applications with Visual Basic |
||||
APA | (2000). Developing secure applications with Visual Basic, Indianapolis, Indiana: SAMS. | ||||
MLA | Developing secure applications with Visual Basic. Indianapolis, Indiana: SAMS, 2000. | ||||
Harvard | 2000. Developing secure applications with Visual Basic. SAMS, | ||||
Chicago | Developing secure applications with Visual Basic. SAMS, 2000. | ||||
|
Database nation : the death of privacy in the 21st century |
||||
APA | (2000). Database nation : the death of privacy in the 21st century, Beijing: O'Reilly. | ||||
MLA | Database nation : the death of privacy in the 21st century. Beijing: O'Reilly, 2000. | ||||
Harvard | 2000. Database nation : the death of privacy in the 21st century. O'Reilly, | ||||
Chicago | Database nation : the death of privacy in the 21st century. O'Reilly, 2000. | ||||
|
Decrypted secrets: methods and maxims of cryptography |
||||
APA | (2000). Decrypted secrets: methods and maxims of cryptography, Berlin: Springer - Verlag. | ||||
MLA | Decrypted secrets: methods and maxims of cryptography. Berlin: Springer - Verlag, 2000. | ||||
Harvard | 2000. Decrypted secrets: methods and maxims of cryptography. Springer - Verlag, | ||||
Chicago | Decrypted secrets: methods and maxims of cryptography. Springer - Verlag, 2000. | ||||
|
Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings |
||||
APA | (1996). Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings, Berlin: Springer. | ||||
MLA | Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Berlin: Springer, 1996. | ||||
Harvard | 1996. Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer, | ||||
Chicago | Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer, 1996. | ||||
|
Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997 |
||||
APA | (1998). Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997, Berlin: Springer. | ||||
MLA | Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Berlin: Springer, 1998. | ||||
Harvard | 1998. Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer, | ||||
Chicago | Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer, 1998. | ||||
|
Configuring Windows 2000 server security |
||||
APA | (2000). Configuring Windows 2000 server security, Rockland, MA: Syngress Media. | ||||
MLA | Configuring Windows 2000 server security. Rockland, MA: Syngress Media, 2000. | ||||
Harvard | 2000. Configuring Windows 2000 server security. Syngress Media, | ||||
Chicago | Configuring Windows 2000 server security. Syngress Media, 2000. | ||||
|
IT manager's guide to virtual private networks |
||||
APA | (1999). IT manager's guide to virtual private networks, New York: McGraw - Hill. | ||||
MLA | IT manager's guide to virtual private networks. New York: McGraw - Hill, 1999. | ||||
Harvard | 1999. IT manager's guide to virtual private networks. McGraw - Hill, | ||||
Chicago | IT manager's guide to virtual private networks. McGraw - Hill, 1999. | ||||
|
Cisco network security |
||||
APA | (2001). Cisco network security, Upper Saddle River, New Jersey: Prentice - Hall. | ||||
MLA | Cisco network security. Upper Saddle River, New Jersey: Prentice - Hall, 2001. | ||||
Harvard | 2001. Cisco network security. Prentice - Hall, | ||||
Chicago | Cisco network security. Prentice - Hall, 2001. | ||||
|
Security complete |
||||
APA | (2001). Security complete, San Francisco: SYBEX. | ||||
MLA | Security complete. San Francisco: SYBEX, 2001. | ||||
Harvard | 2001. Security complete. SYBEX, | ||||
Chicago | Security complete. SYBEX, 2001. | ||||
|
Modern cryptography, probabilistic proofs and pseudorandomness |
||||
APA | (1999). Modern cryptography, probabilistic proofs and pseudorandomness, Berlin: Springer. | ||||
MLA | Modern cryptography, probabilistic proofs and pseudorandomness. Berlin: Springer, 1999. | ||||
Harvard | 1999. Modern cryptography, probabilistic proofs and pseudorandomness. Springer, | ||||
Chicago | Modern cryptography, probabilistic proofs and pseudorandomness. Springer, 1999. | ||||
|
Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998 |
||||
APA | (2000). Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998, Berlin: Springer. | ||||
MLA | Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Berlin: Springer, 2000. | ||||
Harvard | 2000. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer, | ||||
Chicago | Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer, 2000. | ||||
|
Lectures on data security: modern cryptology in theory and practice |
||||
APA | (1999). Lectures on data security: modern cryptology in theory and practice, Berlin: Springer. | ||||
MLA | Lectures on data security: modern cryptology in theory and practice. Berlin: Springer, 1999. | ||||
Harvard | 1999. Lectures on data security: modern cryptology in theory and practice. Springer, | ||||
Chicago | Lectures on data security: modern cryptology in theory and practice. Springer, 1999. | ||||
|
Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings |
||||
APA | (1997). Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings, Berlin: Springer. | ||||
MLA | Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997. | ||||
Harvard | 1997. Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, | ||||
Chicago | Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, 1997. | ||||
|
Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings |
||||
APA | (1998). Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings, Berlin: Springer. | ||||
MLA | Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Berlin: Springer, 1998. | ||||
Harvard | 1998. Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer, | ||||
Chicago | Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer, 1998. | ||||
|
Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings |
||||
APA | (1999). Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings, Berlin: Springer. | ||||
MLA | Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Berlin: Springer, 1999. | ||||
Harvard | 1999. Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer, | ||||
Chicago | Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer, 1999. | ||||
|
Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings |
||||
APA | (1998). Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings, Berlin: Springer. | ||||
MLA | Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Berlin: Springer, 1998. | ||||
Harvard | 1998. Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer, | ||||
Chicago | Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer, 1998. | ||||
|
State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures |
||||
APA | (1998). State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures , Berlin: Springer. | ||||
MLA | State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures . Berlin: Springer, 1998. | ||||
Harvard | 1998. State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer, | ||||
Chicago | State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer, 1998. | ||||
|
Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc |
||||
APA | (1999). Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc, Berlin: Springer. | ||||
MLA | Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Berlin: Springer, 1999. | ||||
Harvard | 1999. Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer, | ||||
Chicago | Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer, 1999. | ||||
|
Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings |
||||
APA | (1998). Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings, Berlin: Springer. | ||||
MLA | Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Berlin: Springer, 1998. | ||||
Harvard | 1998. Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer, | ||||
Chicago | Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer, 1998. | ||||
|
Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings |
||||
APA | (1999). Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings, Berlin: Springer. | ||||
MLA | Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Berlin: Springer, 1999. | ||||
Harvard | 1999. Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer, | ||||
Chicago | Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer, 1999. | ||||
|
Maximum Windows 2000 security |
||||
APA | (2002). Maximum Windows 2000 security, Indianapolis, Indiana: Sams. | ||||
MLA | Maximum Windows 2000 security. Indianapolis, Indiana: Sams, 2002. | ||||
Harvard | 2002. Maximum Windows 2000 security. Sams, | ||||
Chicago | Maximum Windows 2000 security. Sams, 2002. | ||||
|
Maximum security |
||||
APA | (2001). Maximum security, Indianapolis, Indiana: Sams. | ||||
MLA | Maximum security. Indianapolis, Indiana: Sams, 2001. | ||||
Harvard | 2001. Maximum security. Sams, | ||||
Chicago | Maximum security. Sams, 2001. | ||||
|
.NET framework security |
||||
APA | (2002). .NET framework security, Boston: Addison - Wesley. | ||||
MLA | .NET framework security. Boston: Addison - Wesley, 2002. | ||||
Harvard | 2002. .NET framework security. Addison - Wesley, | ||||
Chicago | .NET framework security. Addison - Wesley, 2002. | ||||
|
Information security architecture: an integrated approach to security in the organization |
||||
APA | (2000). Information security architecture: an integrated approach to security in the organization, Boca Raton: Auerbach. | ||||
MLA | Information security architecture: an integrated approach to security in the organization. Boca Raton: Auerbach, 2000. | ||||
Harvard | 2000. Information security architecture: an integrated approach to security in the organization. Auerbach, | ||||
Chicago | Information security architecture: an integrated approach to security in the organization. Auerbach, 2000. | ||||
|
Information security risk analysis |
||||
APA | (2001). Information security risk analysis, Boca Raton: Auerbach. | ||||
MLA | Information security risk analysis. Boca Raton: Auerbach, 2001. | ||||
Harvard | 2001. Information security risk analysis. Auerbach, | ||||
Chicago | Information security risk analysis. Auerbach, 2001. | ||||
|
Security management: an introduction |
||||
APA | (2002). Security management: an introduction, Upper Saddle River, New Jersey: Prentice-Hall. | ||||
MLA | Security management: an introduction. Upper Saddle River, New Jersey: Prentice-Hall, 2002. | ||||
Harvard | 2002. Security management: an introduction. Prentice-Hall, | ||||
Chicago | Security management: an introduction. Prentice-Hall, 2002. | ||||
|
Security and privacy for e-business |
||||
APA | (2001). Security and privacy for e-business, New York: John Wiley and Sons, Inc.. | ||||
MLA | Security and privacy for e-business. New York: John Wiley and Sons, Inc., 2001. | ||||
Harvard | 2001. Security and privacy for e-business. John Wiley and Sons, Inc., | ||||
Chicago | Security and privacy for e-business. John Wiley and Sons, Inc., 2001. | ||||
|
Digital signature |
||||
APA | (2002). Digital signature. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Digital signature. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2002, | ||||
Harvard | 2002, Digital signature (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Digital signature." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2002. | ||||
|
Investigation into : data and system security |
||||
APA | (1997). Investigation into : data and system security. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Investigation into : data and system security. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 1997, | ||||
Harvard | 1997, Investigation into : data and system security (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Investigation into : data and system security." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 1997. | ||||
|
Encrypt message using RSA and El gamal schemes |
||||
APA | (2003). Encrypt message using RSA and El gamal schemes. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Encrypt message using RSA and El gamal schemes. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2003, | ||||
Harvard | 2003, Encrypt message using RSA and El gamal schemes (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Encrypt message using RSA and El gamal schemes." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2003. | ||||
|
Identification method |
||||
APA | ([199-]). Identification method. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Identification method. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, [199-], | ||||
Harvard | [199-], Identification method (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Identification method." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, [199-]. | ||||
|
Juevara encryption method |
||||
APA | (2002). Juevara encryption method. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Juevara encryption method. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 2002, | ||||
Harvard | 2002, Juevara encryption method (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Juevara encryption method." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 2002. | ||||
|
Encryption and decryption |
||||
APA | (1999). Encryption and decryption. (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ Philadelphia University). | ||||
MLA | . Encryption and decryption. ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ) Philadelphia University, 1999, | ||||
Harvard | 1999, Encryption and decryption (ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University). | ||||
Chicago | "Encryption and decryption." ãÔÑæÚ ÊÎÑÌ (ÈßÇáæÑíæÓ)¡ Philadelphia University, 1999. | ||||
|
Security in computing |
||||
APA | (2003). Security in computing, Upper Saddle River, New Jersey: Prentice Hall. | ||||
MLA | Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 2003. | ||||
Harvard | 2003. Security in computing. Prentice Hall, | ||||
Chicago | Security in computing. Prentice Hall, 2003. | ||||
|
How secure is your wireless network? safeguarding your Wi-Fi Lan |
||||
APA | (2004). How secure is your wireless network? safeguarding your Wi-Fi Lan, Upper Saddle River, New Jersey: Prentice Hall. | ||||
MLA | How secure is your wireless network? safeguarding your Wi-Fi Lan. Upper Saddle River, New Jersey: Prentice Hall, 2004. | ||||
Harvard | 2004. How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall, | ||||
Chicago | How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall, 2004. | ||||
|
PDA security: incorporating handhelds into the enterprise |
||||
APA | (2003). PDA security: incorporating handhelds into the enterprise, New York: McGraw-Hill. | ||||
MLA | PDA security: incorporating handhelds into the enterprise. New York: McGraw-Hill, 2003. | ||||
Harvard | 2003. PDA security: incorporating handhelds into the enterprise. McGraw-Hill, | ||||
Chicago | PDA security: incorporating handhelds into the enterprise. McGraw-Hill, 2003. | ||||
|
Wireless operational security |
||||
APA | (2004). Wireless operational security, Amsterdam: Elsevier. | ||||
MLA | Wireless operational security. Amsterdam: Elsevier, 2004. | ||||
Harvard | 2004. Wireless operational security. Elsevier, | ||||
Chicago | Wireless operational security. Elsevier, 2004. | ||||
|
Public key infrastructure: building trusted applications and web services |
||||
APA | (2004). Public key infrastructure: building trusted applications and web services , Bocca Raton: Auerbach Publications. | ||||
MLA | Public key infrastructure: building trusted applications and web services . Bocca Raton: Auerbach Publications, 2004. | ||||
Harvard | 2004. Public key infrastructure: building trusted applications and web services. Auerbach Publications, | ||||
Chicago | Public key infrastructure: building trusted applications and web services. Auerbach Publications, 2004. | ||||
|
Defend I.T. : security by example |
||||
APA | (2004). Defend I.T. : security by example, Boston: Addison-Wesley. | ||||
MLA | Defend I.T. : security by example. Boston: Addison-Wesley, 2004. | ||||
Harvard | 2004. Defend I.T. : security by example. Addison-Wesley, | ||||
Chicago | Defend I.T. : security by example. Addison-Wesley, 2004. | ||||
|
Designing network security |
||||
APA | (2004). Designing network security, Indianapolis, Indiana: Cisco Press. | ||||
MLA | Designing network security. Indianapolis, Indiana: Cisco Press, 2004. | ||||
Harvard | 2004. Designing network security. Cisco Press, | ||||
Chicago | Designing network security. Cisco Press, 2004. | ||||
|
Software forensics: collecting evidence from the scene of a digital crime |
||||
APA | (2004). Software forensics: collecting evidence from the scene of a digital crime , New York: McGraw-Hill. | ||||
MLA | Software forensics: collecting evidence from the scene of a digital crime . New York: McGraw-Hill, 2004. | ||||
Harvard | 2004. Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill, | ||||
Chicago | Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill, 2004. | ||||
|
ISA server 2004 unleashed |
||||
APA | (2006). ISA server 2004 unleashed, Indianapolis, Indiana: SAMS. | ||||
MLA | ISA server 2004 unleashed. Indianapolis, Indiana: SAMS, 2006. | ||||
Harvard | 2006. ISA server 2004 unleashed. SAMS, | ||||
Chicago | ISA server 2004 unleashed. SAMS, 2006. | ||||
|
Cisco network security troubleshooting handbook |
||||
APA | (2006). Cisco network security troubleshooting handbook, Indianapolis, Indiana: Cisco Press. | ||||
MLA | Cisco network security troubleshooting handbook. Indianapolis, Indiana: Cisco Press, 2006. | ||||
Harvard | 2006. Cisco network security troubleshooting handbook. Cisco Press, | ||||
Chicago | Cisco network security troubleshooting handbook. Cisco Press, 2006. | ||||
|
Core security patterns: best practices and strategies for J2EE, Web services and identity management |
||||
APA | (2005). Core security patterns: best practices and strategies for J2EE, Web services and identity management, Upper Saddle River, NJ: Prentice Hall. | ||||
MLA | Core security patterns: best practices and strategies for J2EE, Web services and identity management. Upper Saddle River, NJ: Prentice Hall, 2005. | ||||
Harvard | 2005. Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall, | ||||
Chicago | Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall, 2005. | ||||
|
A simple guide to security and privacy on your PC |
||||
APA | (2000). A simple guide to security and privacy on your PC, Harlow: Prentice Hall. | ||||
MLA | A simple guide to security and privacy on your PC. Harlow: Prentice Hall, 2000. | ||||
Harvard | 2000. A simple guide to security and privacy on your PC. Prentice Hall, | ||||
Chicago | A simple guide to security and privacy on your PC. Prentice Hall, 2000. | ||||
|
Administering Windows Vista security: the big surprises |
||||
APA | (2007). Administering Windows Vista security: the big surprises, Indianapolis, Indiana: Wiley Publishing, Inc.. | ||||
MLA | Administering Windows Vista security: the big surprises. Indianapolis, Indiana: Wiley Publishing, Inc., 2007. | ||||
Harvard | 2007. Administering Windows Vista security: the big surprises. Wiley Publishing, Inc., | ||||
Chicago | Administering Windows Vista security: the big surprises. Wiley Publishing, Inc., 2007. | ||||
|
Hacking the Xbox: an introduction to reverse engineering |
||||
APA | (2003). Hacking the Xbox: an introduction to reverse engineering, San Francisco: No Starch Press, Inc.. | ||||
MLA | Hacking the Xbox: an introduction to reverse engineering. San Francisco: No Starch Press, Inc., 2003. | ||||
Harvard | 2003. Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc., | ||||
Chicago | Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc., 2003. | ||||
|
Reversing: secrets of reverse engineering |
||||
APA | (2005). Reversing: secrets of reverse engineering, Indianapolis, Indiana: Wiley Publishing. | ||||
MLA | Reversing: secrets of reverse engineering. Indianapolis, Indiana: Wiley Publishing, 2005. | ||||
Harvard | 2005. Reversing: secrets of reverse engineering. Wiley Publishing, | ||||
Chicago | Reversing: secrets of reverse engineering. Wiley Publishing, 2005. | ||||
|
Data protection and information lifecycle management |
||||
APA | (2006). Data protection and information lifecycle management, Upper Saddle River, NJ: Prentice Hall. | ||||
MLA | Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice Hall, 2006. | ||||
Harvard | 2006. Data protection and information lifecycle management. Prentice Hall, | ||||
Chicago | Data protection and information lifecycle management. Prentice Hall, 2006. | ||||
|
Microsoft Windows XP networking and security: inside out: also covers Windows 2000 |
||||
APA | (2006). Microsoft Windows XP networking and security: inside out: also covers Windows 2000, New Delhi: Prentice Hall of India. | ||||
MLA | Microsoft Windows XP networking and security: inside out: also covers Windows 2000. New Delhi: Prentice Hall of India, 2006. | ||||
Harvard | 2006. Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India, | ||||
Chicago | Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India, 2006. | ||||
|
Network security: a practical approach |
||||
APA | (2006). Network security: a practical approach, New Delhi: Elsevier. | ||||
MLA | Network security: a practical approach. New Delhi: Elsevier, 2006. | ||||
Harvard | 2006. Network security: a practical approach. Elsevier, | ||||
Chicago | Network security: a practical approach. Elsevier, 2006. | ||||
|
IT governance: a manager's guide to data security and BS 7799-ISO 17799 |
||||
APA | (2005). IT governance: a manager's guide to data security and BS 7799-ISO 17799 , London: Kogan Page. | ||||
MLA | IT governance: a manager's guide to data security and BS 7799-ISO 17799 . London: Kogan Page, 2005. | ||||
Harvard | 2005. IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page, | ||||
Chicago | IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page, 2005. | ||||
|
Internet security: a jumpstart for systems administrators and IT managers |
||||
APA | (2003). Internet security: a jumpstart for systems administrators and IT managers , New Delhi: Digital Press. | ||||
MLA | Internet security: a jumpstart for systems administrators and IT managers . New Delhi: Digital Press, 2003. | ||||
Harvard | 2003. Internet security: a jumpstart for systems administrators and IT managers. Digital Press, | ||||
Chicago | Internet security: a jumpstart for systems administrators and IT managers. Digital Press, 2003. | ||||
|
Wireless security: models, threats, and solutions |
||||
APA | (2006). Wireless security: models, threats, and solutions, New Delhi: Tata McGraw-Hill. | ||||
MLA | Wireless security: models, threats, and solutions. New Delhi: Tata McGraw-Hill, 2006. | ||||
Harvard | 2006. Wireless security: models, threats, and solutions. Tata McGraw-Hill, | ||||
Chicago | Wireless security: models, threats, and solutions. Tata McGraw-Hill, 2006. | ||||
|
Network security: current status and future directions |
||||
APA | (2007). Network security: current status and future directions, Hoboken, N.J.: John Wiley & Sons. | ||||
MLA | Network security: current status and future directions. Hoboken, N.J.: John Wiley & Sons, 2007. | ||||
Harvard | 2007. Network security: current status and future directions. John Wiley & Sons, | ||||
Chicago | Network security: current status and future directions. John Wiley & Sons, 2007. | ||||
|
Cryptography and network security: principles and practice |
||||
APA | (2006). Cryptography and network security: principles and practice, Upper Saddle River, New Jersey: Pearson Prentice Hall. | ||||
MLA | Cryptography and network security: principles and practice. Upper Saddle River, New Jersey: Pearson Prentice Hall, 2006. | ||||
Harvard | 2006. Cryptography and network security: principles and practice. Pearson Prentice Hall, | ||||
Chicago | Cryptography and network security: principles and practice. Pearson Prentice Hall, 2006. | ||||
|
Cisco ASA, PIX, and FWSM firewall handbook |
||||
APA | (2008). Cisco ASA, PIX, and FWSM firewall handbook, Indianapolis, Indiana: Cisco Press. | ||||
MLA | Cisco ASA, PIX, and FWSM firewall handbook. Indianapolis, Indiana: Cisco Press, 2008. | ||||
Harvard | 2008. Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press, | ||||
Chicago | Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press, 2008. | ||||
|
The security development lifecycle : SDL, a process for developing demonstrably more secure software |
||||
APA | (2006). The security development lifecycle : SDL, a process for developing demonstrably more secure software, Redmond, Washington: Microsoft Press. | ||||
MLA | The security development lifecycle : SDL, a process for developing demonstrably more secure software. Redmond, Washington: Microsoft Press, 2006. | ||||
Harvard | 2006. The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press, | ||||
Chicago | The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006. | ||||
|
Software security : building security in |
||||
APA | (2006). Software security : building security in, Upper Saddle River, NJ : Addison-Wesley. | ||||
MLA | Software security : building security in. Upper Saddle River, NJ : Addison-Wesley, 2006. | ||||
Harvard | 2006. Software security : building security in. Addison-Wesley, | ||||
Chicago | Software security : building security in. Addison-Wesley, 2006. | ||||
|
CEH : certified ethical hacker study guide |
||||
APA | (2010). CEH : certified ethical hacker study guide, Indianapolis, Ind.: Wiley Publishing, Inc.. | ||||
MLA | CEH : certified ethical hacker study guide. Indianapolis, Ind.: Wiley Publishing, Inc., 2010. | ||||
Harvard | 2010. CEH : certified ethical hacker study guide. Wiley Publishing, Inc., | ||||
Chicago | CEH : certified ethical hacker study guide. Wiley Publishing, Inc., 2010. | ||||
|
Gray hat hacking : the ethical hacker’s handbook |
||||
APA | (2011). Gray hat hacking : the ethical hacker’s handbook, New York: McGraw-Hill. | ||||
MLA | Gray hat hacking : the ethical hacker’s handbook. New York: McGraw-Hill, 2011. | ||||
Harvard | 2011. Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill, | ||||
Chicago | Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill, 2011. | ||||
|
Computer security: principles and practice |
||||
APA | (2008). Computer security: principles and practice , Upper Saddle River, NJ.: Pearson/Prentice Hall. | ||||
MLA | Computer security: principles and practice . Upper Saddle River, NJ.: Pearson/Prentice Hall, 2008. | ||||
Harvard | 2008. Computer security: principles and practice . Pearson/Prentice Hall, | ||||
Chicago | Computer security: principles and practice . Pearson/Prentice Hall, 2008. | ||||
|
Best antivirus collection [electronic resource] |
||||
APA | ([-2000]). Best antivirus collection [electronic resource], [s.l]: [s.n]. | ||||
MLA | Best antivirus collection [electronic resource]. [s.l]: [s.n], [-2000]. | ||||
Harvard | [-2000]. Best antivirus collection [electronic resource]. [s.n], | ||||
Chicago | Best antivirus collection [electronic resource]. [s.n], [-2000]. | ||||
|
Information security and cyber laws |
||||
APA | (2010). Information security and cyber laws, New Delhi: S. K. Kataria & Sons. | ||||
MLA | Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2010. | ||||
Harvard | 2010. Information security and cyber laws. S. K. Kataria & Sons, | ||||
Chicago | Information security and cyber laws. S. K. Kataria & Sons, 2010. | ||||
|
Information security and cyber laws |
||||
APA | (2011). Information security and cyber laws, New Delhi: S. K. Kataria & Sons. | ||||
MLA | Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2011. | ||||
Harvard | 2011. Information security and cyber laws. S. K. Kataria & Sons, | ||||
Chicago | Information security and cyber laws. S. K. Kataria & Sons, 2011. | ||||
|
The art of enterprise information architecture: a systems-based approach for unlocking business insight |
||||
APA | (2010). The art of enterprise information architecture: a systems-based approach for unlocking business insight, Upper Saddle River, NJ: IBM Press, Pearson. | ||||
MLA | The art of enterprise information architecture: a systems-based approach for unlocking business insight. Upper Saddle River, NJ: IBM Press, Pearson, 2010. | ||||
Harvard | 2010. The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson, | ||||
Chicago | The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson, 2010. | ||||
|
Information security: principles and practice |
||||
APA | (2011). Information security: principles and practice, Hoboken, New Jersey: Wiley . | ||||
MLA | Information security: principles and practice. Hoboken, New Jersey: Wiley , 2011. | ||||
Harvard | 2011. Information security: principles and practice. Wiley , | ||||
Chicago | Information security: principles and practice. Wiley , 2011. | ||||
|
Business data networks and security |
||||
APA | (2013). Business data networks and security, Boston: Pearson . | ||||
MLA | Business data networks and security. Boston: Pearson , 2013. | ||||
Harvard | 2013. Business data networks and security. Pearson , | ||||
Chicago | Business data networks and security. Pearson , 2013. | ||||
|
Principles of information security |
||||
APA | (2013). Principles of information security, Delhi: Cengage Learning India. | ||||
MLA | Principles of information security. Delhi: Cengage Learning India, 2013. | ||||
Harvard | 2013. Principles of information security. Cengage Learning India, | ||||
Chicago | Principles of information security. Cengage Learning India, 2013. | ||||
|
Security and computer: management strategy |
||||
APA | (1987). Security and computer: management strategy , Beirut: Union of Arab Banks. | ||||
MLA | Security and computer: management strategy . Beirut: Union of Arab Banks, 1987. | ||||
Harvard | 1987. Security and computer: management strategy . Union of Arab Banks, | ||||
Chicago | Security and computer: management strategy . Union of Arab Banks, 1987. | ||||
|
Network security |
||||
APA | (2012). Network security, New Delhi: S. K. Kataria & Sons. | ||||
MLA | Network security. New Delhi: S. K. Kataria & Sons, 2012. | ||||
Harvard | 2012. Network security. S. K. Kataria & Sons, | ||||
Chicago | Network security. S. K. Kataria & Sons, 2012. | ||||
|
Network security : private communication in a public world |
||||
APA | (2013). Network security : private communication in a public world, New Delhi: PHI Learning Private Limited. | ||||
MLA | Network security : private communication in a public world. New Delhi: PHI Learning Private Limited, 2013. | ||||
Harvard | 2013. Network security : private communication in a public world. PHI Learning Private Limited, | ||||
Chicago | Network security : private communication in a public world. PHI Learning Private Limited, 2013. | ||||
|
Core banking solution : evaluation of security and controls |
||||
APA | (2013). Core banking solution : evaluation of security and controls, New Delhi: PHI Learning Private Limited. | ||||
MLA | Core banking solution : evaluation of security and controls. New Delhi: PHI Learning Private Limited, 2013. | ||||
Harvard | 2013. Core banking solution : evaluation of security and controls. PHI Learning Private Limited, | ||||
Chicago | Core banking solution : evaluation of security and controls. PHI Learning Private Limited, 2013. | ||||
|
Information security and cyber laws |
||||
APA | (2014). Information security and cyber laws, New Delhi: Technical Publications. | ||||
MLA | Information security and cyber laws. New Delhi: Technical Publications, 2014. | ||||
Harvard | 2014. Information security and cyber laws. Technical Publications, | ||||
Chicago | Information security and cyber laws. Technical Publications, 2014. | ||||
|
Computer and information security handbook |
||||
APA | (2013). Computer and information security handbook, Amsterdam: Elsevier. | ||||
MLA | Computer and information security handbook. Amsterdam: Elsevier, 2013. | ||||
Harvard | 2013. Computer and information security handbook. Elsevier, | ||||
Chicago | Computer and information security handbook. Elsevier, 2013. | ||||
|
Introduction to computer security |
||||
APA | (2014). Introduction to computer security, Harlow: Pearson Education Limited. | ||||
MLA | Introduction to computer security. Harlow: Pearson Education Limited, 2014. | ||||
Harvard | 2014. Introduction to computer security. Pearson Education Limited, | ||||
Chicago | Introduction to computer security. Pearson Education Limited, 2014. | ||||
|
Network security essentials : applications and standards |
||||
APA | (2014). Network security essentials : applications and standards, Harlow: Pearson Education Limited. | ||||
MLA | Network security essentials : applications and standards. Harlow: Pearson Education Limited, 2014. | ||||
Harvard | 2014. Network security essentials : applications and standards. Pearson Education Limited, | ||||
Chicago | Network security essentials : applications and standards. Pearson Education Limited, 2014. | ||||
|
Computer forensics : infoSec Pro guide |
||||
APA | (2013). Computer forensics : infoSec Pro guide, New York: McGraw-Hill. | ||||
MLA | Computer forensics : infoSec Pro guide. New York: McGraw-Hill, 2013. | ||||
Harvard | 2013. Computer forensics : infoSec Pro guide. McGraw-Hill, | ||||
Chicago | Computer forensics : infoSec Pro guide. McGraw-Hill, 2013. | ||||
|
Security + guide to network security fundamentals |
||||
APA | (2012). Security + guide to network security fundamentals, Australia: Course Technology. | ||||
MLA | Security + guide to network security fundamentals. Australia: Course Technology, 2012. | ||||
Harvard | 2012. Security + guide to network security fundamentals. Course Technology, | ||||
Chicago | Security + guide to network security fundamentals. Course Technology, 2012. | ||||
|
Handbook of research on emerging developments in data privacy |
||||
APA | (2015). Handbook of research on emerging developments in data privacy, USA: IGI Global. | ||||
MLA | Handbook of research on emerging developments in data privacy. USA: IGI Global, 2015. | ||||
Harvard | 2015. Handbook of research on emerging developments in data privacy. IGI Global, | ||||
Chicago | Handbook of research on emerging developments in data privacy. IGI Global, 2015. | ||||
|
Securing the virtual environment : how to defend the enterprise against attack |
||||
APA | (2012). Securing the virtual environment : how to defend the enterprise against attack, New Delhi: Wiley India Pvt. Ltd. | ||||
MLA | Securing the virtual environment : how to defend the enterprise against attack. New Delhi: Wiley India Pvt. Ltd, 2012. | ||||
Harvard | 2012. Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd, | ||||
Chicago | Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd, 2012. | ||||
|
CompTIA security + (Exam SYO-301) : training kit |
||||
APA | (2014). CompTIA security + (Exam SYO-301) : training kit, New Delhi: PHI Learning Private Limited. | ||||
MLA | CompTIA security + (Exam SYO-301) : training kit. New Delhi: PHI Learning Private Limited, 2014. | ||||
Harvard | 2014. CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited, | ||||
Chicago | CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited, 2014. | ||||
|
Network security |
||||
APA | (2013). Network security, New Delhi: S. K. Kataria & Sons. | ||||
MLA | Network security. New Delhi: S. K. Kataria & Sons, 2013. | ||||
Harvard | 2013. Network security. S. K. Kataria & Sons, | ||||
Chicago | Network security. S. K. Kataria & Sons, 2013. | ||||
|
Information security management handbook |
||||
APA | (2012). Information security management handbook, London: CRC Press/ Taylor & Francis. | ||||
MLA | Information security management handbook. London: CRC Press/ Taylor & Francis, 2012. | ||||
Harvard | 2012. Information security management handbook. CRC Press/ Taylor & Francis, | ||||
Chicago | Information security management handbook. CRC Press/ Taylor & Francis, 2012. | ||||
|
Computer security: principles and practice |
||||
APA | (2015). Computer security: principles and practice , Boston: Pearson Education Limited. | ||||
MLA | Computer security: principles and practice . Boston: Pearson Education Limited, 2015. | ||||
Harvard | 2015. Computer security: principles and practice . Pearson Education Limited, | ||||
Chicago | Computer security: principles and practice . Pearson Education Limited, 2015. | ||||
|
Cryptography and network security: principles and practice |
||||
APA | (2014). Cryptography and network security: principles and practice, Boston: Pearson Education Limited. | ||||
MLA | Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2014. | ||||
Harvard | 2014. Cryptography and network security: principles and practice. Pearson Education Limited, | ||||
Chicago | Cryptography and network security: principles and practice. Pearson Education Limited, 2014. | ||||
|
Core software security : security at the source |
||||
APA | (2014). Core software security : security at the source, London: CRC Press, Taylor & Francis Group . | ||||
MLA | Core software security : security at the source. London: CRC Press, Taylor & Francis Group , 2014. | ||||
Harvard | 2014. Core software security : security at the source. CRC Press, Taylor & Francis Group , | ||||
Chicago | Core software security : security at the source. CRC Press, Taylor & Francis Group , 2014. | ||||
|
Secure and resilient software development |
||||
APA | (2010). Secure and resilient software development, London: CRC Press/Taylor & Francis Group. | ||||
MLA | Secure and resilient software development. London: CRC Press/Taylor & Francis Group, 2010. | ||||
Harvard | 2010. Secure and resilient software development. CRC Press/Taylor & Francis Group, | ||||
Chicago | Secure and resilient software development. CRC Press/Taylor & Francis Group, 2010. | ||||
|
Secure software design |
||||
APA | (2013). Secure software design, Burlington: Johnes & Bartlett Learning. | ||||
MLA | Secure software design. Burlington: Johnes & Bartlett Learning, 2013. | ||||
Harvard | 2013. Secure software design. Johnes & Bartlett Learning, | ||||
Chicago | Secure software design. Johnes & Bartlett Learning, 2013. | ||||
|
Principles of information security |
||||
APA | (2016). Principles of information security, Boston: Cengage Learning. | ||||
MLA | Principles of information security. Boston: Cengage Learning, 2016. | ||||
Harvard | 2016. Principles of information security. Cengage Learning, | ||||
Chicago | Principles of information security. Cengage Learning, 2016. | ||||
|
The web application : hacker's handbook |
||||
APA | (2011). The web application : hacker's handbook, Indianapolis: Wiley Publishing , Inc.. | ||||
MLA | The web application : hacker's handbook. Indianapolis: Wiley Publishing , Inc., 2011. | ||||
Harvard | 2011. The web application : hacker's handbook. Wiley Publishing , Inc., | ||||
Chicago | The web application : hacker's handbook. Wiley Publishing , Inc., 2011. | ||||
|
Computer security fundamentals |
||||
APA | (2016). Computer security fundamentals, Indianapolis: Pearson Education. | ||||
MLA | Computer security fundamentals. Indianapolis: Pearson Education, 2016. | ||||
Harvard | 2016. Computer security fundamentals. Pearson Education, | ||||
Chicago | Computer security fundamentals. Pearson Education, 2016. | ||||
|
Security + guide to network security fundamentals |
||||
APA | (2018). Security + guide to network security fundamentals, Australia: Cengage Learning. | ||||
MLA | Security + guide to network security fundamentals. Australia: Cengage Learning, 2018. | ||||
Harvard | 2018. Security + guide to network security fundamentals. Cengage Learning, | ||||
Chicago | Security + guide to network security fundamentals. Cengage Learning, 2018. | ||||
|
Foundations of information security : a straightforward introduction |
||||
APA | (2019). Foundations of information security : a straightforward introduction, San Francisco: No Starch Press. | ||||
MLA | Foundations of information security : a straightforward introduction. San Francisco: No Starch Press, 2019. | ||||
Harvard | 2019. Foundations of information security : a straightforward introduction. No Starch Press, | ||||
Chicago | Foundations of information security : a straightforward introduction. No Starch Press, 2019. | ||||
|
Security of web developers |
||||
APA | (2016). Security of web developers, Beijing: O'Reilly Media. | ||||
MLA | Security of web developers. Beijing: O'Reilly Media, 2016. | ||||
Harvard | 2016. Security of web developers. O'Reilly Media, | ||||
Chicago | Security of web developers. O'Reilly Media, 2016. | ||||
|
Security + guide to network security fundamentals |
||||
APA | (2012). Security + guide to network security fundamentals, Australia: Course Technology. | ||||
MLA | Security + guide to network security fundamentals. Australia: Course Technology, 2012. | ||||
Harvard | 2012. Security + guide to network security fundamentals. Course Technology, | ||||
Chicago | Security + guide to network security fundamentals. Course Technology, 2012. | ||||
|
Fintech law in a nutshell |
||||
APA | (2020). Fintech law in a nutshell, Paul, MN.: West Academic Publishing. | ||||
MLA | Fintech law in a nutshell. Paul, MN.: West Academic Publishing, 2020. | ||||
Harvard | 2020. Fintech law in a nutshell. West Academic Publishing, | ||||
Chicago | Fintech law in a nutshell. West Academic Publishing, 2020. | ||||
|
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework |
||||
APA | (2022). Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework, Hoboken: John Wiley & Sons. | ||||
MLA | Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. Hoboken: John Wiley & Sons, 2022. | ||||
Harvard | 2022. Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons, | ||||
Chicago | Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons, 2022. | ||||
|
Information security: principles and practice |
||||
APA | (2022). Information security: principles and practice, Hoboken, New Jersey: Wiley . | ||||
MLA | Information security: principles and practice. Hoboken, New Jersey: Wiley , 2022. | ||||
Harvard | 2022. Information security: principles and practice. Wiley , | ||||
Chicago | Information security: principles and practice. Wiley , 2022. | ||||
|
Cryptography and network security: principles and practice |
||||
APA | (2023). Cryptography and network security: principles and practice, Boston: Pearson Education Limited. | ||||
MLA | Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2023. | ||||
Harvard | 2023. Cryptography and network security: principles and practice. Pearson Education Limited, | ||||
Chicago | Cryptography and network security: principles and practice. Pearson Education Limited, 2023. | ||||
|
Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) |
||||
APA | (2017). Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) , UK: EPR Bublishing. | ||||
MLA | Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . UK: EPR Bublishing, 2017. | ||||
Harvard | 2017. Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing, | ||||
Chicago | Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing, 2017. | ||||
|
Fundamentals of information systems security |
||||
APA | (2023). Fundamentals of information systems security, Burlington: Jones & Bartlett Learning. | ||||
MLA | Fundamentals of information systems security. Burlington: Jones & Bartlett Learning, 2023. | ||||
Harvard | 2023. Fundamentals of information systems security. Jones & Bartlett Learning, | ||||
Chicago | Fundamentals of information systems security. Jones & Bartlett Learning, 2023. |