|
|
Practical unix and internet security |
APA |
(1996).
Practical unix and internet security,
Bonn:
O'Reilly and associates, Inc..
|
MLA |
Practical unix and internet security.
Bonn:
O'Reilly and associates, Inc.,
1996.
|
Harvard |
1996.
Practical unix and internet security.
O'Reilly and associates, Inc.,
|
Chicago |
Practical unix and internet security.
O'Reilly and associates, Inc.,
1996.
|
|
|
Computer security handbook |
APA |
(1988).
Computer security handbook,
New York:
Macmillan.
|
MLA |
Computer security handbook.
New York:
Macmillan,
1988.
|
Harvard |
1988.
Computer security handbook.
Macmillan,
|
Chicago |
Computer security handbook.
Macmillan,
1988.
|
|
|
Computer security basics |
APA |
(1991).
Computer security basics,
Sebastopol:
O'Reilly & Associates.
|
MLA |
Computer security basics.
Sebastopol:
O'Reilly & Associates,
1991.
|
Harvard |
1991.
Computer security basics.
O'Reilly & Associates,
|
Chicago |
Computer security basics.
O'Reilly & Associates,
1991.
|
|
|
Unix system security: how to protect your data and prevent intruders |
APA |
(1990).
Unix system security: how to protect your data and prevent intruders,
Reading, Massachusetts:
Addison-Wesley.
|
MLA |
Unix system security: how to protect your data and prevent intruders.
Reading, Massachusetts:
Addison-Wesley,
1990.
|
Harvard |
1990.
Unix system security: how to protect your data and prevent intruders.
Addison-Wesley,
|
Chicago |
Unix system security: how to protect your data and prevent intruders.
Addison-Wesley,
1990.
|
|
|
applied cryptography: protocols, algorithms, and source code in C |
APA |
(1996).
applied cryptography: protocols, algorithms, and source code in C,
N.Y:
John Wiley & Sons.
|
MLA |
applied cryptography: protocols, algorithms, and source code in C.
N.Y:
John Wiley & Sons,
1996.
|
Harvard |
1996.
applied cryptography: protocols, algorithms, and source code in C.
John Wiley & Sons,
|
Chicago |
applied cryptography: protocols, algorithms, and source code in C.
John Wiley & Sons,
1996.
|
|
|
The stephen cobb complete book of PC and LAN security |
APA |
(1990).
The stephen cobb complete book of PC and LAN security,
N.Y:
Windcrest.
|
MLA |
The stephen cobb complete book of PC and LAN security.
N.Y:
Windcrest,
1990.
|
Harvard |
1990.
The stephen cobb complete book of PC and LAN security.
Windcrest,
|
Chicago |
The stephen cobb complete book of PC and LAN security.
Windcrest,
1990.
|
|
|
Unix security for the organization |
APA |
(1994).
Unix security for the organization,
Indianapolis:
Sams publishing.
|
MLA |
Unix security for the organization.
Indianapolis:
Sams publishing,
1994.
|
Harvard |
1994.
Unix security for the organization.
Sams publishing,
|
Chicago |
Unix security for the organization.
Sams publishing,
1994.
|
|
|
Java security |
APA |
(1996).
Java security,
New York:
John Wiley & Sons.
|
MLA |
Java security.
New York:
John Wiley & Sons,
1996.
|
Harvard |
1996.
Java security.
John Wiley & Sons,
|
Chicago |
Java security.
John Wiley & Sons,
1996.
|
|
|
Fundamentals of computer security technology |
APA |
(1994).
Fundamentals of computer security technology,
New Jersey:
Prentice Hall.
|
MLA |
Fundamentals of computer security technology.
New Jersey:
Prentice Hall,
1994.
|
Harvard |
1994.
Fundamentals of computer security technology.
Prentice Hall,
|
Chicago |
Fundamentals of computer security technology.
Prentice Hall,
1994.
|
|
|
Security in computing |
APA |
(1997).
Security in computing,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
Security in computing.
Upper Saddle River, New Jersey:
Prentice Hall,
1997.
|
Harvard |
1997.
Security in computing.
Prentice Hall,
|
Chicago |
Security in computing.
Prentice Hall,
1997.
|
|
|
Cryptography and network security : principles and practice |
APA |
(1998).
Cryptography and network security : principles and practice,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
Cryptography and network security : principles and practice.
Upper Saddle River, New Jersey:
Prentice Hall,
1998.
|
Harvard |
1998.
Cryptography and network security : principles and practice.
Prentice Hall,
|
Chicago |
Cryptography and network security : principles and practice.
Prentice Hall,
1998.
|
|
|
Introduction to data security and controls |
APA |
(1982).
Introduction to data security and controls,
Wellesley, Massachusetts:
Q.E.D. Information Science, INC..
|
MLA |
Introduction to data security and controls.
Wellesley, Massachusetts:
Q.E.D. Information Science, INC.,
1982.
|
Harvard |
1982.
Introduction to data security and controls.
Q.E.D. Information Science, INC.,
|
Chicago |
Introduction to data security and controls.
Q.E.D. Information Science, INC.,
1982.
|
|
|
Information and communications security: conference proceedings held in
Beijing, China, 11 - 14, November, 1997 |
APA |
(1997).
Information and communications security: conference proceedings held in
Beijing, China, 11 - 14, November, 1997,
Berlin:
Springer - Verlag.
|
MLA |
Information and communications security: conference proceedings held in
Beijing, China, 11 - 14, November, 1997.
Berlin:
Springer - Verlag,
1997.
|
Harvard |
1997.
Information and communications security: conference proceedings held in
Beijing, China, 11 - 14, November, 1997.
Springer - Verlag,
|
Chicago |
Information and communications security: conference proceedings held in
Beijing, China, 11 - 14, November, 1997.
Springer - Verlag,
1997.
|
|
|
Security protocols: workshop proceedings held in Cambridge, United Kingdom,
10 - 12 April, 1996 |
APA |
(1997).
Security protocols: workshop proceedings held in Cambridge, United
Kingdom, 10 - 12 April, 1996,
Berlin:
Springer - Verlag.
|
MLA |
Security protocols: workshop proceedings held in Cambridge, United
Kingdom, 10 - 12 April, 1996.
Berlin:
Springer - Verlag,
1997.
|
Harvard |
1997.
Security protocols: workshop proceedings held in Cambridge, United Kingdom,
10 - 12 April, 1996.
Springer - Verlag,
|
Chicago |
Security protocols: workshop proceedings held in Cambridge, United Kingdom,
10 - 12 April, 1996.
Springer - Verlag,
1997.
|
|
|
Information security and privacy: conference proceedings held in Brisbane,
Australia, 13 - 15 July, 1998 |
APA |
(1998).
Information security and privacy: conference proceedings held in Brisbane,
Australia, 13 - 15 July, 1998,
Berlin:
Springer - Verlag.
|
MLA |
Information security and privacy: conference proceedings held in Brisbane,
Australia, 13 - 15 July, 1998.
Berlin:
Springer - Verlag,
1998.
|
Harvard |
1998.
Information security and privacy: conference proceedings held in Brisbane,
Australia, 13 - 15 July, 1998.
Springer - Verlag,
|
Chicago |
Information security and privacy: conference proceedings held in Brisbane,
Australia, 13 - 15 July, 1998.
Springer - Verlag,
1998.
|
|
|
Digital signature schemes: general framework and fail-stop signatures |
APA |
(1996).
Digital signature schemes: general framework and fail-stop signatures,
Berlin:
Springer - Verlag.
|
MLA |
Digital signature schemes: general framework and fail-stop signatures.
Berlin:
Springer - Verlag,
1996.
|
Harvard |
1996.
Digital signature schemes: general framework and fail-stop signatures.
Springer - Verlag,
|
Chicago |
Digital signature schemes: general framework and fail-stop signatures.
Springer - Verlag,
1996.
|
|
|
Hacking exposed: network security, secrets and solutions |
APA |
(2001).
Hacking exposed: network security, secrets and solutions,
Berkeley:
Osborne/ McGraw - Hill.
|
MLA |
Hacking exposed: network security, secrets and solutions.
Berkeley:
Osborne/ McGraw - Hill,
2001.
|
Harvard |
2001.
Hacking exposed: network security, secrets and solutions.
Osborne/ McGraw - Hill,
|
Chicago |
Hacking exposed: network security, secrets and solutions.
Osborne/ McGraw - Hill,
2001.
|
|
|
MCSE: windows 2000 network security design: exam notes |
APA |
(2001).
MCSE: windows 2000 network security design: exam notes,
San Francisco:
SYBEX.
|
MLA |
MCSE: windows 2000 network security design: exam notes.
San Francisco:
SYBEX,
2001.
|
Harvard |
2001.
MCSE: windows 2000 network security design: exam notes.
SYBEX,
|
Chicago |
MCSE: windows 2000 network security design: exam notes.
SYBEX,
2001.
|
|
|
Windows 2000 security handbook |
APA |
(2001).
Windows 2000 security handbook,
Berkeley, California:
Osborne/ McGraw - Hill.
|
MLA |
Windows 2000 security handbook.
Berkeley, California:
Osborne/ McGraw - Hill,
2001.
|
Harvard |
2001.
Windows 2000 security handbook.
Osborne/ McGraw - Hill,
|
Chicago |
Windows 2000 security handbook.
Osborne/ McGraw - Hill,
2001.
|
|
|
Java security handbook |
APA |
(2000).
Java security handbook,
Indianapolis, Indiana:
SAMS.
|
MLA |
Java security handbook.
Indianapolis, Indiana:
SAMS,
2000.
|
Harvard |
2000.
Java security handbook.
SAMS,
|
Chicago |
Java security handbook.
SAMS,
2000.
|
|
|
Windows 2000 user management |
APA |
(2000).
Windows 2000 user management,
Indianapolis, Indiana:
New Riders.
|
MLA |
Windows 2000 user management.
Indianapolis, Indiana:
New Riders,
2000.
|
Harvard |
2000.
Windows 2000 user management.
New Riders,
|
Chicago |
Windows 2000 user management.
New Riders,
2000.
|
|
|
Hacker attack |
APA |
(2000).
Hacker attack,
San Francisco:
SYBEX.
|
MLA |
Hacker attack.
San Francisco:
SYBEX,
2000.
|
Harvard |
2000.
Hacker attack.
SYBEX,
|
Chicago |
Hacker attack.
SYBEX,
2000.
|
|
|
Protecting your web site with firewalls |
APA |
(1997).
Protecting your web site with firewalls,
Upper Saddle River, New Jersey:
Prentice - Hall.
|
MLA |
Protecting your web site with firewalls.
Upper Saddle River, New Jersey:
Prentice - Hall,
1997.
|
Harvard |
1997.
Protecting your web site with firewalls.
Prentice - Hall,
|
Chicago |
Protecting your web site with firewalls.
Prentice - Hall,
1997.
|
|
|
Firewalls : a complete guide |
APA |
(2000).
Firewalls : a complete guide,
New York:
McGraw - Hill.
|
MLA |
Firewalls : a complete guide.
New York:
McGraw - Hill,
2000.
|
Harvard |
2000.
Firewalls : a complete guide.
McGraw - Hill,
|
Chicago |
Firewalls : a complete guide.
McGraw - Hill,
2000.
|
|
|
Practical firewalls |
APA |
(2000).
Practical firewalls,
Indianapolis, Indiana:
Que.
|
MLA |
Practical firewalls.
Indianapolis, Indiana:
Que,
2000.
|
Harvard |
2000.
Practical firewalls.
Que,
|
Chicago |
Practical firewalls.
Que,
2000.
|
|
|
Developing secure applications with Visual Basic |
APA |
(2000).
Developing secure applications with Visual Basic,
Indianapolis, Indiana:
SAMS.
|
MLA |
Developing secure applications with Visual Basic.
Indianapolis, Indiana:
SAMS,
2000.
|
Harvard |
2000.
Developing secure applications with Visual Basic.
SAMS,
|
Chicago |
Developing secure applications with Visual Basic.
SAMS,
2000.
|
|
|
Database nation : the death of privacy in the 21st century |
APA |
(2000).
Database nation : the death of privacy in the 21st century,
Beijing:
O'Reilly.
|
MLA |
Database nation : the death of privacy in the 21st century.
Beijing:
O'Reilly,
2000.
|
Harvard |
2000.
Database nation : the death of privacy in the 21st century.
O'Reilly,
|
Chicago |
Database nation : the death of privacy in the 21st century.
O'Reilly,
2000.
|
|
|
Decrypted secrets: methods and maxims of cryptography |
APA |
(2000).
Decrypted secrets: methods and maxims of cryptography,
Berlin:
Springer - Verlag.
|
MLA |
Decrypted secrets: methods and maxims of cryptography.
Berlin:
Springer - Verlag,
2000.
|
Harvard |
2000.
Decrypted secrets: methods and maxims of cryptography.
Springer - Verlag,
|
Chicago |
Decrypted secrets: methods and maxims of cryptography.
Springer - Verlag,
2000.
|
|
|
Information hiding: first international workshop, Cambridge, U.K., May 30 -
June 1, 1996: Proceedings |
APA |
(1996).
Information hiding: first international workshop, Cambridge, U.K., May 30
- June 1, 1996: Proceedings,
Berlin:
Springer.
|
MLA |
Information hiding: first international workshop, Cambridge, U.K., May 30
- June 1, 1996: Proceedings.
Berlin:
Springer,
1996.
|
Harvard |
1996.
Information hiding: first international workshop, Cambridge, U.K., May 30 -
June 1, 1996: Proceedings.
Springer,
|
Chicago |
Information hiding: first international workshop, Cambridge, U.K., May 30 -
June 1, 1996: Proceedings.
Springer,
1996.
|
|
|
Advances in cryptology, 1981-1997: electronic proceedings and index of the
crypto and Eurocrypt conferences 1981-1997 |
APA |
(1998).
Advances in cryptology, 1981-1997: electronic proceedings and index of the
crypto and Eurocrypt conferences 1981-1997,
Berlin:
Springer.
|
MLA |
Advances in cryptology, 1981-1997: electronic proceedings and index of the
crypto and Eurocrypt conferences 1981-1997.
Berlin:
Springer,
1998.
|
Harvard |
1998.
Advances in cryptology, 1981-1997: electronic proceedings and index of the
crypto and Eurocrypt conferences 1981-1997.
Springer,
|
Chicago |
Advances in cryptology, 1981-1997: electronic proceedings and index of the
crypto and Eurocrypt conferences 1981-1997.
Springer,
1998.
|
|
|
Configuring Windows 2000 server security |
APA |
(2000).
Configuring Windows 2000 server security,
Rockland, MA:
Syngress Media.
|
MLA |
Configuring Windows 2000 server security.
Rockland, MA:
Syngress Media,
2000.
|
Harvard |
2000.
Configuring Windows 2000 server security.
Syngress Media,
|
Chicago |
Configuring Windows 2000 server security.
Syngress Media,
2000.
|
|
|
IT manager's guide to virtual private networks |
APA |
(1999).
IT manager's guide to virtual private networks,
New York:
McGraw - Hill.
|
MLA |
IT manager's guide to virtual private networks.
New York:
McGraw - Hill,
1999.
|
Harvard |
1999.
IT manager's guide to virtual private networks.
McGraw - Hill,
|
Chicago |
IT manager's guide to virtual private networks.
McGraw - Hill,
1999.
|
|
|
Cisco network security |
APA |
(2001).
Cisco network security,
Upper Saddle River, New Jersey:
Prentice - Hall.
|
MLA |
Cisco network security.
Upper Saddle River, New Jersey:
Prentice - Hall,
2001.
|
Harvard |
2001.
Cisco network security.
Prentice - Hall,
|
Chicago |
Cisco network security.
Prentice - Hall,
2001.
|
|
|
Security complete |
APA |
(2001).
Security complete,
San Francisco:
SYBEX.
|
MLA |
Security complete.
San Francisco:
SYBEX,
2001.
|
Harvard |
2001.
Security complete.
SYBEX,
|
Chicago |
Security complete.
SYBEX,
2001.
|
|
|
Modern cryptography, probabilistic proofs and pseudorandomness |
APA |
(1999).
Modern cryptography, probabilistic proofs and pseudorandomness,
Berlin:
Springer.
|
MLA |
Modern cryptography, probabilistic proofs and pseudorandomness.
Berlin:
Springer,
1999.
|
Harvard |
1999.
Modern cryptography, probabilistic proofs and pseudorandomness.
Springer,
|
Chicago |
Modern cryptography, probabilistic proofs and pseudorandomness.
Springer,
1999.
|
|
|
Coding theory, cryptography, and related areas : proceedings of an
International Conference on Coding Theory, Cryptography, and Related Areas,
held in Guanajuato, Mexico, in April 1998 |
APA |
(2000).
Coding theory, cryptography, and related areas : proceedings of an
International Conference on Coding Theory, Cryptography, and Related Areas,
held in Guanajuato, Mexico, in April 1998,
Berlin:
Springer.
|
MLA |
Coding theory, cryptography, and related areas : proceedings of an
International Conference on Coding Theory, Cryptography, and Related Areas,
held in Guanajuato, Mexico, in April 1998.
Berlin:
Springer,
2000.
|
Harvard |
2000.
Coding theory, cryptography, and related areas : proceedings of an
International Conference on Coding Theory, Cryptography, and Related Areas,
held in Guanajuato, Mexico, in April 1998.
Springer,
|
Chicago |
Coding theory, cryptography, and related areas : proceedings of an
International Conference on Coding Theory, Cryptography, and Related Areas,
held in Guanajuato, Mexico, in April 1998.
Springer,
2000.
|
|
|
Lectures on data security: modern cryptology in theory and practice |
APA |
(1999).
Lectures on data security: modern cryptology in theory and practice,
Berlin:
Springer.
|
MLA |
Lectures on data security: modern cryptology in theory and practice.
Berlin:
Springer,
1999.
|
Harvard |
1999.
Lectures on data security: modern cryptology in theory and practice.
Springer,
|
Chicago |
Lectures on data security: modern cryptology in theory and practice.
Springer,
1999.
|
|
|
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings |
APA |
(1997).
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings,
Berlin:
Springer.
|
MLA |
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Berlin:
Springer,
1997.
|
Harvard |
1997.
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Springer,
|
Chicago |
Financial cryptography : First International Conference, FC '97, Anguilla,
British West Indies, February 24-28, 1997 : proceedings.
Springer,
1997.
|
|
|
Information security: first international workshop, ISW'97, Tatsunokuchi,
Ishikawa, Japan, September 17-19, 1997: Proceedings |
APA |
(1998).
Information security: first international workshop, ISW'97, Tatsunokuchi,
Ishikawa, Japan, September 17-19, 1997: Proceedings,
Berlin:
Springer.
|
MLA |
Information security: first international workshop, ISW'97, Tatsunokuchi,
Ishikawa, Japan, September 17-19, 1997: Proceedings.
Berlin:
Springer,
1998.
|
Harvard |
1998.
Information security: first international workshop, ISW'97, Tatsunokuchi,
Ishikawa, Japan, September 17-19, 1997: Proceedings.
Springer,
|
Chicago |
Information security: first international workshop, ISW'97, Tatsunokuchi,
Ishikawa, Japan, September 17-19, 1997: Proceedings.
Springer,
1998.
|
|
|
Information security and privacy: 4th Australasian Conference, ACISP'99,
Wollongong, NSW, Australia, April 7-9, 1999: Proceedings |
APA |
(1999).
Information security and privacy: 4th Australasian Conference, ACISP'99,
Wollongong, NSW, Australia, April 7-9, 1999: Proceedings,
Berlin:
Springer.
|
MLA |
Information security and privacy: 4th Australasian Conference, ACISP'99,
Wollongong, NSW, Australia, April 7-9, 1999: Proceedings.
Berlin:
Springer,
1999.
|
Harvard |
1999.
Information security and privacy: 4th Australasian Conference, ACISP'99,
Wollongong, NSW, Australia, April 7-9, 1999: Proceedings.
Springer,
|
Chicago |
Information security and privacy: 4th Australasian Conference, ACISP'99,
Wollongong, NSW, Australia, April 7-9, 1999: Proceedings.
Springer,
1999.
|
|
|
Selected areas in cryptography: 5th annual international workshop, SAC'98,
Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings |
APA |
(1998).
Selected areas in cryptography: 5th annual international workshop, SAC'98,
Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings,
Berlin:
Springer.
|
MLA |
Selected areas in cryptography: 5th annual international workshop, SAC'98,
Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings.
Berlin:
Springer,
1998.
|
Harvard |
1998.
Selected areas in cryptography: 5th annual international workshop, SAC'98,
Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings.
Springer,
|
Chicago |
Selected areas in cryptography: 5th annual international workshop, SAC'98,
Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings.
Springer,
1998.
|
|
|
State of the art in applied cryptography:"course on computer security and
industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures
|
APA |
(1998).
State of the art in applied cryptography:"course on computer security and
industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures
,
Berlin:
Springer.
|
MLA |
State of the art in applied cryptography:"course on computer security and
industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures
.
Berlin:
Springer,
1998.
|
Harvard |
1998.
State of the art in applied cryptography:"course on computer security and
industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures.
Springer,
|
Chicago |
State of the art in applied cryptography:"course on computer security and
industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures.
Springer,
1998.
|
|
|
Public key cryptography: second international workshop on practice and theory
in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc
|
APA |
(1999).
Public key cryptography: second international workshop on practice and
theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999:
Proc,
Berlin:
Springer.
|
MLA |
Public key cryptography: second international workshop on practice and
theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999:
Proc.
Berlin:
Springer,
1999.
|
Harvard |
1999.
Public key cryptography: second international workshop on practice and theory
in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc.
Springer,
|
Chicago |
Public key cryptography: second international workshop on practice and theory
in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc.
Springer,
1999.
|
|
|
Information hiding:"second international workshop, IH'98: Portland, Oregon,
USA, April 14-17, 1998: Proceedings |
APA |
(1998).
Information hiding:"second international workshop, IH'98: Portland,
Oregon, USA, April 14-17, 1998: Proceedings,
Berlin:
Springer.
|
MLA |
Information hiding:"second international workshop, IH'98: Portland,
Oregon, USA, April 14-17, 1998: Proceedings.
Berlin:
Springer,
1998.
|
Harvard |
1998.
Information hiding:"second international workshop, IH'98: Portland, Oregon,
USA, April 14-17, 1998: Proceedings.
Springer,
|
Chicago |
Information hiding:"second international workshop, IH'98: Portland, Oregon,
USA, April 14-17, 1998: Proceedings.
Springer,
1998.
|
|
|
Security protocols: 6th international workshop, Cambridge, UK, April 15-17,
1998: proceedings |
APA |
(1999).
Security protocols: 6th international workshop, Cambridge, UK, April
15-17, 1998: proceedings,
Berlin:
Springer.
|
MLA |
Security protocols: 6th international workshop, Cambridge, UK, April
15-17, 1998: proceedings.
Berlin:
Springer,
1999.
|
Harvard |
1999.
Security protocols: 6th international workshop, Cambridge, UK, April 15-17,
1998: proceedings.
Springer,
|
Chicago |
Security protocols: 6th international workshop, Cambridge, UK, April 15-17,
1998: proceedings.
Springer,
1999.
|
|
|
Maximum Windows 2000 security |
APA |
(2002).
Maximum Windows 2000 security,
Indianapolis, Indiana:
Sams.
|
MLA |
Maximum Windows 2000 security.
Indianapolis, Indiana:
Sams,
2002.
|
Harvard |
2002.
Maximum Windows 2000 security.
Sams,
|
Chicago |
Maximum Windows 2000 security.
Sams,
2002.
|
|
|
Maximum security |
APA |
(2001).
Maximum security,
Indianapolis, Indiana:
Sams.
|
MLA |
Maximum security.
Indianapolis, Indiana:
Sams,
2001.
|
Harvard |
2001.
Maximum security.
Sams,
|
Chicago |
Maximum security.
Sams,
2001.
|
|
|
.NET framework security |
APA |
(2002).
.NET framework security,
Boston:
Addison - Wesley.
|
MLA |
.NET framework security.
Boston:
Addison - Wesley,
2002.
|
Harvard |
2002.
.NET framework security.
Addison - Wesley,
|
Chicago |
.NET framework security.
Addison - Wesley,
2002.
|
|
|
Information security architecture: an integrated approach to security in the
organization |
APA |
(2000).
Information security architecture: an integrated approach to security in
the organization,
Boca Raton:
Auerbach.
|
MLA |
Information security architecture: an integrated approach to security in
the organization.
Boca Raton:
Auerbach,
2000.
|
Harvard |
2000.
Information security architecture: an integrated approach to security in the
organization.
Auerbach,
|
Chicago |
Information security architecture: an integrated approach to security in the
organization.
Auerbach,
2000.
|
|
|
Information security risk analysis |
APA |
(2001).
Information security risk analysis,
Boca Raton:
Auerbach.
|
MLA |
Information security risk analysis.
Boca Raton:
Auerbach,
2001.
|
Harvard |
2001.
Information security risk analysis.
Auerbach,
|
Chicago |
Information security risk analysis.
Auerbach,
2001.
|
|
|
Security management: an introduction |
APA |
(2002).
Security management: an introduction,
Upper Saddle River, New Jersey:
Prentice-Hall.
|
MLA |
Security management: an introduction.
Upper Saddle River, New Jersey:
Prentice-Hall,
2002.
|
Harvard |
2002.
Security management: an introduction.
Prentice-Hall,
|
Chicago |
Security management: an introduction.
Prentice-Hall,
2002.
|
|
|
Security and privacy for e-business |
APA |
(2001).
Security and privacy for e-business,
New York:
John Wiley and Sons, Inc..
|
MLA |
Security and privacy for e-business.
New York:
John Wiley and Sons, Inc.,
2001.
|
Harvard |
2001.
Security and privacy for e-business.
John Wiley and Sons, Inc.,
|
Chicago |
Security and privacy for e-business.
John Wiley and Sons, Inc.,
2001.
|
|
|
Digital signature |
APA |
(2002).
Digital signature. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Digital signature. مشروع تخرج (بكالوريوس)
Philadelphia University,
2002,
|
Harvard |
2002,
Digital signature (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Digital signature." مشروع تخرج (بكالوريوس)،
Philadelphia University,
2002.
|
|
|
Investigation into : data and system security |
APA |
(1997).
Investigation into : data and system security. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Investigation into : data and system security. مشروع تخرج (بكالوريوس)
Philadelphia University,
1997,
|
Harvard |
1997,
Investigation into : data and system security (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Investigation into : data and system security." مشروع تخرج (بكالوريوس)،
Philadelphia University,
1997.
|
|
|
Encrypt message using RSA and El gamal schemes |
APA |
(2003).
Encrypt message using RSA and El gamal schemes. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Encrypt message using RSA and El gamal schemes. مشروع تخرج
(بكالوريوس)
Philadelphia University,
2003,
|
Harvard |
2003,
Encrypt message using RSA and El gamal schemes (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Encrypt message using RSA and El gamal schemes." مشروع تخرج (بكالوريوس)،
Philadelphia University,
2003.
|
|
|
Identification method |
APA |
([199-]).
Identification method. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Identification method. مشروع تخرج (بكالوريوس)
Philadelphia University,
[199-],
|
Harvard |
[199-],
Identification method (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Identification method." مشروع تخرج (بكالوريوس)،
Philadelphia University,
[199-].
|
|
|
Juevara encryption method |
APA |
(2002).
Juevara encryption method. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Juevara encryption method. مشروع تخرج (بكالوريوس)
Philadelphia University,
2002,
|
Harvard |
2002,
Juevara encryption method (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Juevara encryption method." مشروع تخرج (بكالوريوس)،
Philadelphia University,
2002.
|
|
|
Encryption and decryption |
APA |
(1999).
Encryption and decryption. (مشروع تخرج (بكالوريوس
Philadelphia University).
|
MLA |
. Encryption and decryption. مشروع تخرج (بكالوريوس)
Philadelphia University,
1999,
|
Harvard |
1999,
Encryption and decryption (مشروع تخرج (بكالوريوس)،
Philadelphia University).
|
Chicago |
"Encryption and decryption." مشروع تخرج (بكالوريوس)،
Philadelphia University,
1999.
|
|
|
Security in computing |
APA |
(2003).
Security in computing,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
Security in computing.
Upper Saddle River, New Jersey:
Prentice Hall,
2003.
|
Harvard |
2003.
Security in computing.
Prentice Hall,
|
Chicago |
Security in computing.
Prentice Hall,
2003.
|
|
|
How secure is your wireless network? safeguarding your Wi-Fi Lan |
APA |
(2004).
How secure is your wireless network? safeguarding your Wi-Fi Lan,
Upper Saddle River, New Jersey:
Prentice Hall.
|
MLA |
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Upper Saddle River, New Jersey:
Prentice Hall,
2004.
|
Harvard |
2004.
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Prentice Hall,
|
Chicago |
How secure is your wireless network? safeguarding your Wi-Fi Lan.
Prentice Hall,
2004.
|
|
|
PDA security: incorporating handhelds into the enterprise |
APA |
(2003).
PDA security: incorporating handhelds into the enterprise,
New York:
McGraw-Hill.
|
MLA |
PDA security: incorporating handhelds into the enterprise.
New York:
McGraw-Hill,
2003.
|
Harvard |
2003.
PDA security: incorporating handhelds into the enterprise.
McGraw-Hill,
|
Chicago |
PDA security: incorporating handhelds into the enterprise.
McGraw-Hill,
2003.
|
|
|
Wireless operational security |
APA |
(2004).
Wireless operational security,
Amsterdam:
Elsevier.
|
MLA |
Wireless operational security.
Amsterdam:
Elsevier,
2004.
|
Harvard |
2004.
Wireless operational security.
Elsevier,
|
Chicago |
Wireless operational security.
Elsevier,
2004.
|
|
|
Public key infrastructure: building trusted applications and web services
|
APA |
(2004).
Public key infrastructure: building trusted applications and web services
,
Bocca Raton:
Auerbach Publications.
|
MLA |
Public key infrastructure: building trusted applications and web services
.
Bocca Raton:
Auerbach Publications,
2004.
|
Harvard |
2004.
Public key infrastructure: building trusted applications and web services.
Auerbach Publications,
|
Chicago |
Public key infrastructure: building trusted applications and web services.
Auerbach Publications,
2004.
|
|
|
Defend I.T. : security by example |
APA |
(2004).
Defend I.T. : security by example,
Boston:
Addison-Wesley.
|
MLA |
Defend I.T. : security by example.
Boston:
Addison-Wesley,
2004.
|
Harvard |
2004.
Defend I.T. : security by example.
Addison-Wesley,
|
Chicago |
Defend I.T. : security by example.
Addison-Wesley,
2004.
|
|
|
Designing network security |
APA |
(2004).
Designing network security,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Designing network security.
Indianapolis, Indiana:
Cisco Press,
2004.
|
Harvard |
2004.
Designing network security.
Cisco Press,
|
Chicago |
Designing network security.
Cisco Press,
2004.
|
|
|
Software forensics: collecting evidence from the scene of a digital crime
|
APA |
(2004).
Software forensics: collecting evidence from the scene of a digital crime
,
New York:
McGraw-Hill.
|
MLA |
Software forensics: collecting evidence from the scene of a digital crime
.
New York:
McGraw-Hill,
2004.
|
Harvard |
2004.
Software forensics: collecting evidence from the scene of a digital crime.
McGraw-Hill,
|
Chicago |
Software forensics: collecting evidence from the scene of a digital crime.
McGraw-Hill,
2004.
|
|
|
ISA server 2004 unleashed |
APA |
(2006).
ISA server 2004 unleashed,
Indianapolis, Indiana:
SAMS.
|
MLA |
ISA server 2004 unleashed.
Indianapolis, Indiana:
SAMS,
2006.
|
Harvard |
2006.
ISA server 2004 unleashed.
SAMS,
|
Chicago |
ISA server 2004 unleashed.
SAMS,
2006.
|
|
|
Cisco network security troubleshooting handbook |
APA |
(2006).
Cisco network security troubleshooting handbook,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Cisco network security troubleshooting handbook.
Indianapolis, Indiana:
Cisco Press,
2006.
|
Harvard |
2006.
Cisco network security troubleshooting handbook.
Cisco Press,
|
Chicago |
Cisco network security troubleshooting handbook.
Cisco Press,
2006.
|
|
|
Core security patterns: best practices and strategies for J2EE, Web services
and identity management |
APA |
(2005).
Core security patterns: best practices and strategies for J2EE, Web
services and identity management,
Upper Saddle River, NJ:
Prentice Hall.
|
MLA |
Core security patterns: best practices and strategies for J2EE, Web
services and identity management.
Upper Saddle River, NJ:
Prentice Hall,
2005.
|
Harvard |
2005.
Core security patterns: best practices and strategies for J2EE, Web services
and identity management.
Prentice Hall,
|
Chicago |
Core security patterns: best practices and strategies for J2EE, Web services
and identity management.
Prentice Hall,
2005.
|
|
|
A simple guide to security and privacy on your PC |
APA |
(2000).
A simple guide to security and privacy on your PC,
Harlow:
Prentice Hall.
|
MLA |
A simple guide to security and privacy on your PC.
Harlow:
Prentice Hall,
2000.
|
Harvard |
2000.
A simple guide to security and privacy on your PC.
Prentice Hall,
|
Chicago |
A simple guide to security and privacy on your PC.
Prentice Hall,
2000.
|
|
|
Administering Windows Vista security: the big surprises |
APA |
(2007).
Administering Windows Vista security: the big surprises,
Indianapolis, Indiana:
Wiley Publishing, Inc..
|
MLA |
Administering Windows Vista security: the big surprises.
Indianapolis, Indiana:
Wiley Publishing, Inc.,
2007.
|
Harvard |
2007.
Administering Windows Vista security: the big surprises.
Wiley Publishing, Inc.,
|
Chicago |
Administering Windows Vista security: the big surprises.
Wiley Publishing, Inc.,
2007.
|
|
|
Hacking the Xbox: an introduction to reverse engineering |
APA |
(2003).
Hacking the Xbox: an introduction to reverse engineering,
San Francisco:
No Starch Press, Inc..
|
MLA |
Hacking the Xbox: an introduction to reverse engineering.
San Francisco:
No Starch Press, Inc.,
2003.
|
Harvard |
2003.
Hacking the Xbox: an introduction to reverse engineering.
No Starch Press, Inc.,
|
Chicago |
Hacking the Xbox: an introduction to reverse engineering.
No Starch Press, Inc.,
2003.
|
|
|
Reversing: secrets of reverse engineering |
APA |
(2005).
Reversing: secrets of reverse engineering,
Indianapolis, Indiana:
Wiley Publishing.
|
MLA |
Reversing: secrets of reverse engineering.
Indianapolis, Indiana:
Wiley Publishing,
2005.
|
Harvard |
2005.
Reversing: secrets of reverse engineering.
Wiley Publishing,
|
Chicago |
Reversing: secrets of reverse engineering.
Wiley Publishing,
2005.
|
|
|
Data protection and information lifecycle management |
APA |
(2006).
Data protection and information lifecycle management,
Upper Saddle River, NJ:
Prentice Hall.
|
MLA |
Data protection and information lifecycle management.
Upper Saddle River, NJ:
Prentice Hall,
2006.
|
Harvard |
2006.
Data protection and information lifecycle management.
Prentice Hall,
|
Chicago |
Data protection and information lifecycle management.
Prentice Hall,
2006.
|
|
|
Microsoft Windows XP networking and security: inside out: also covers Windows
2000 |
APA |
(2006).
Microsoft Windows XP networking and security: inside out: also covers
Windows 2000,
New Delhi:
Prentice Hall of India.
|
MLA |
Microsoft Windows XP networking and security: inside out: also covers
Windows 2000.
New Delhi:
Prentice Hall of India,
2006.
|
Harvard |
2006.
Microsoft Windows XP networking and security: inside out: also covers Windows
2000.
Prentice Hall of India,
|
Chicago |
Microsoft Windows XP networking and security: inside out: also covers Windows
2000.
Prentice Hall of India,
2006.
|
|
|
Network security: a practical approach |
APA |
(2006).
Network security: a practical approach,
New Delhi:
Elsevier.
|
MLA |
Network security: a practical approach.
New Delhi:
Elsevier,
2006.
|
Harvard |
2006.
Network security: a practical approach.
Elsevier,
|
Chicago |
Network security: a practical approach.
Elsevier,
2006.
|
|
|
IT governance: a manager's guide to data security and BS 7799-ISO 17799
|
APA |
(2005).
IT governance: a manager's guide to data security and BS 7799-ISO 17799
,
London:
Kogan Page.
|
MLA |
IT governance: a manager's guide to data security and BS 7799-ISO 17799
.
London:
Kogan Page,
2005.
|
Harvard |
2005.
IT governance: a manager's guide to data security and BS 7799-ISO 17799.
Kogan Page,
|
Chicago |
IT governance: a manager's guide to data security and BS 7799-ISO 17799.
Kogan Page,
2005.
|
|
|
Internet security: a jumpstart for systems administrators and IT managers
|
APA |
(2003).
Internet security: a jumpstart for systems administrators and IT managers
,
New Delhi:
Digital Press.
|
MLA |
Internet security: a jumpstart for systems administrators and IT managers
.
New Delhi:
Digital Press,
2003.
|
Harvard |
2003.
Internet security: a jumpstart for systems administrators and IT managers.
Digital Press,
|
Chicago |
Internet security: a jumpstart for systems administrators and IT managers.
Digital Press,
2003.
|
|
|
Wireless security: models, threats, and solutions |
APA |
(2006).
Wireless security: models, threats, and solutions,
New Delhi:
Tata McGraw-Hill.
|
MLA |
Wireless security: models, threats, and solutions.
New Delhi:
Tata McGraw-Hill,
2006.
|
Harvard |
2006.
Wireless security: models, threats, and solutions.
Tata McGraw-Hill,
|
Chicago |
Wireless security: models, threats, and solutions.
Tata McGraw-Hill,
2006.
|
|
|
Network security: current status and future directions |
APA |
(2007).
Network security: current status and future directions,
Hoboken, N.J.:
John Wiley & Sons.
|
MLA |
Network security: current status and future directions.
Hoboken, N.J.:
John Wiley & Sons,
2007.
|
Harvard |
2007.
Network security: current status and future directions.
John Wiley & Sons,
|
Chicago |
Network security: current status and future directions.
John Wiley & Sons,
2007.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2006).
Cryptography and network security: principles and practice,
Upper Saddle River, New Jersey:
Pearson Prentice Hall.
|
MLA |
Cryptography and network security: principles and practice.
Upper Saddle River, New Jersey:
Pearson Prentice Hall,
2006.
|
Harvard |
2006.
Cryptography and network security: principles and practice.
Pearson Prentice Hall,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Prentice Hall,
2006.
|
|
|
Cisco ASA, PIX, and FWSM firewall handbook |
APA |
(2008).
Cisco ASA, PIX, and FWSM firewall handbook,
Indianapolis, Indiana:
Cisco Press.
|
MLA |
Cisco ASA, PIX, and FWSM firewall handbook.
Indianapolis, Indiana:
Cisco Press,
2008.
|
Harvard |
2008.
Cisco ASA, PIX, and FWSM firewall handbook.
Cisco Press,
|
Chicago |
Cisco ASA, PIX, and FWSM firewall handbook.
Cisco Press,
2008.
|
|
|
The security development lifecycle : SDL, a process for developing
demonstrably more secure software |
APA |
(2006).
The security development lifecycle : SDL, a process for developing
demonstrably more secure software,
Redmond, Washington:
Microsoft Press.
|
MLA |
The security development lifecycle : SDL, a process for developing
demonstrably more secure software.
Redmond, Washington:
Microsoft Press,
2006.
|
Harvard |
2006.
The security development lifecycle : SDL, a process for developing
demonstrably more secure software.
Microsoft Press,
|
Chicago |
The security development lifecycle : SDL, a process for developing
demonstrably more secure software.
Microsoft Press,
2006.
|
|
|
Software security : building security in |
APA |
(2006).
Software security : building security in,
Upper Saddle River, NJ :
Addison-Wesley.
|
MLA |
Software security : building security in.
Upper Saddle River, NJ :
Addison-Wesley,
2006.
|
Harvard |
2006.
Software security : building security in.
Addison-Wesley,
|
Chicago |
Software security : building security in.
Addison-Wesley,
2006.
|
|
|
CEH : certified ethical hacker study guide |
APA |
(2010).
CEH : certified ethical hacker study guide,
Indianapolis, Ind.:
Wiley Publishing, Inc..
|
MLA |
CEH : certified ethical hacker study guide.
Indianapolis, Ind.:
Wiley Publishing, Inc.,
2010.
|
Harvard |
2010.
CEH : certified ethical hacker study guide.
Wiley Publishing, Inc.,
|
Chicago |
CEH : certified ethical hacker study guide.
Wiley Publishing, Inc.,
2010.
|
|
|
Gray hat hacking : the ethical hacker’s handbook |
APA |
(2011).
Gray hat hacking : the ethical hacker’s handbook,
New York:
McGraw-Hill.
|
MLA |
Gray hat hacking : the ethical hacker’s handbook.
New York:
McGraw-Hill,
2011.
|
Harvard |
2011.
Gray hat hacking : the ethical hacker’s handbook.
McGraw-Hill,
|
Chicago |
Gray hat hacking : the ethical hacker’s handbook.
McGraw-Hill,
2011.
|
|
|
Computer security: principles and practice
|
APA |
(2008).
Computer security: principles and practice
,
Upper Saddle River, NJ.:
Pearson/Prentice Hall.
|
MLA |
Computer security: principles and practice
.
Upper Saddle River, NJ.:
Pearson/Prentice Hall,
2008.
|
Harvard |
2008.
Computer security: principles and practice
.
Pearson/Prentice Hall,
|
Chicago |
Computer security: principles and practice
.
Pearson/Prentice Hall,
2008.
|
|
|
Best antivirus collection [electronic resource] |
APA |
([-2000]).
Best antivirus collection [electronic resource],
[s.l]:
[s.n].
|
MLA |
Best antivirus collection [electronic resource].
[s.l]:
[s.n],
[-2000].
|
Harvard |
[-2000].
Best antivirus collection [electronic resource].
[s.n],
|
Chicago |
Best antivirus collection [electronic resource].
[s.n],
[-2000].
|
|
|
Information security and cyber laws |
APA |
(2010).
Information security and cyber laws,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Information security and cyber laws.
New Delhi:
S. K. Kataria & Sons,
2010.
|
Harvard |
2010.
Information security and cyber laws.
S. K. Kataria & Sons,
|
Chicago |
Information security and cyber laws.
S. K. Kataria & Sons,
2010.
|
|
|
Information security and cyber laws |
APA |
(2011).
Information security and cyber laws,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Information security and cyber laws.
New Delhi:
S. K. Kataria & Sons,
2011.
|
Harvard |
2011.
Information security and cyber laws.
S. K. Kataria & Sons,
|
Chicago |
Information security and cyber laws.
S. K. Kataria & Sons,
2011.
|
|
|
The art of enterprise information architecture: a systems-based approach for
unlocking business insight |
APA |
(2010).
The art of enterprise information architecture: a systems-based approach
for unlocking business insight,
Upper Saddle River, NJ:
IBM Press, Pearson.
|
MLA |
The art of enterprise information architecture: a systems-based approach
for unlocking business insight.
Upper Saddle River, NJ:
IBM Press, Pearson,
2010.
|
Harvard |
2010.
The art of enterprise information architecture: a systems-based approach for
unlocking business insight.
IBM Press, Pearson,
|
Chicago |
The art of enterprise information architecture: a systems-based approach for
unlocking business insight.
IBM Press, Pearson,
2010.
|
|
|
Information security: principles and practice |
APA |
(2011).
Information security: principles and practice,
Hoboken, New Jersey:
Wiley .
|
MLA |
Information security: principles and practice.
Hoboken, New Jersey:
Wiley ,
2011.
|
Harvard |
2011.
Information security: principles and practice.
Wiley ,
|
Chicago |
Information security: principles and practice.
Wiley ,
2011.
|
|
|
Business data networks and security |
APA |
(2013).
Business data networks and security,
Boston:
Pearson .
|
MLA |
Business data networks and security.
Boston:
Pearson ,
2013.
|
Harvard |
2013.
Business data networks and security.
Pearson ,
|
Chicago |
Business data networks and security.
Pearson ,
2013.
|
|
|
Principles of information security |
APA |
(2013).
Principles of information security,
Delhi:
Cengage Learning India.
|
MLA |
Principles of information security.
Delhi:
Cengage Learning India,
2013.
|
Harvard |
2013.
Principles of information security.
Cengage Learning India,
|
Chicago |
Principles of information security.
Cengage Learning India,
2013.
|
|
|
Security and computer: management strategy |
APA |
(1987).
Security and computer: management strategy ,
Beirut:
Union of Arab Banks.
|
MLA |
Security and computer: management strategy .
Beirut:
Union of Arab Banks,
1987.
|
Harvard |
1987.
Security and computer: management strategy .
Union of Arab Banks,
|
Chicago |
Security and computer: management strategy .
Union of Arab Banks,
1987.
|
|
|
Network security |
APA |
(2012).
Network security,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Network security.
New Delhi:
S. K. Kataria & Sons,
2012.
|
Harvard |
2012.
Network security.
S. K. Kataria & Sons,
|
Chicago |
Network security.
S. K. Kataria & Sons,
2012.
|
|
|
Network security : private communication in a public world |
APA |
(2013).
Network security : private communication in a public world,
New Delhi:
PHI Learning Private Limited.
|
MLA |
Network security : private communication in a public world.
New Delhi:
PHI Learning Private Limited,
2013.
|
Harvard |
2013.
Network security : private communication in a public world.
PHI Learning Private Limited,
|
Chicago |
Network security : private communication in a public world.
PHI Learning Private Limited,
2013.
|
|
|
Core banking solution : evaluation of security and controls |
APA |
(2013).
Core banking solution : evaluation of security and controls,
New Delhi:
PHI Learning Private Limited.
|
MLA |
Core banking solution : evaluation of security and controls.
New Delhi:
PHI Learning Private Limited,
2013.
|
Harvard |
2013.
Core banking solution : evaluation of security and controls.
PHI Learning Private Limited,
|
Chicago |
Core banking solution : evaluation of security and controls.
PHI Learning Private Limited,
2013.
|
|
|
Information security and cyber laws |
APA |
(2014).
Information security and cyber laws,
New Delhi:
Technical Publications.
|
MLA |
Information security and cyber laws.
New Delhi:
Technical Publications,
2014.
|
Harvard |
2014.
Information security and cyber laws.
Technical Publications,
|
Chicago |
Information security and cyber laws.
Technical Publications,
2014.
|
|
|
Computer and information security handbook |
APA |
(2013).
Computer and information security handbook,
Amsterdam:
Elsevier.
|
MLA |
Computer and information security handbook.
Amsterdam:
Elsevier,
2013.
|
Harvard |
2013.
Computer and information security handbook.
Elsevier,
|
Chicago |
Computer and information security handbook.
Elsevier,
2013.
|
|
|
Introduction to computer security |
APA |
(2014).
Introduction to computer security,
Harlow:
Pearson Education Limited.
|
MLA |
Introduction to computer security.
Harlow:
Pearson Education Limited,
2014.
|
Harvard |
2014.
Introduction to computer security.
Pearson Education Limited,
|
Chicago |
Introduction to computer security.
Pearson Education Limited,
2014.
|
|
|
Network security essentials : applications and standards |
APA |
(2014).
Network security essentials : applications and standards,
Harlow:
Pearson Education Limited.
|
MLA |
Network security essentials : applications and standards.
Harlow:
Pearson Education Limited,
2014.
|
Harvard |
2014.
Network security essentials : applications and standards.
Pearson Education Limited,
|
Chicago |
Network security essentials : applications and standards.
Pearson Education Limited,
2014.
|
|
|
Computer forensics : infoSec Pro guide |
APA |
(2013).
Computer forensics : infoSec Pro guide,
New York:
McGraw-Hill.
|
MLA |
Computer forensics : infoSec Pro guide.
New York:
McGraw-Hill,
2013.
|
Harvard |
2013.
Computer forensics : infoSec Pro guide.
McGraw-Hill,
|
Chicago |
Computer forensics : infoSec Pro guide.
McGraw-Hill,
2013.
|
|
|
Security + guide to network security fundamentals |
APA |
(2012).
Security + guide to network security fundamentals,
Australia:
Course Technology.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Course Technology,
2012.
|
Harvard |
2012.
Security + guide to network security fundamentals.
Course Technology,
|
Chicago |
Security + guide to network security fundamentals.
Course Technology,
2012.
|
|
|
Handbook of research on emerging developments in data privacy |
APA |
(2015).
Handbook of research on emerging developments in data privacy,
USA:
IGI Global.
|
MLA |
Handbook of research on emerging developments in data privacy.
USA:
IGI Global,
2015.
|
Harvard |
2015.
Handbook of research on emerging developments in data privacy.
IGI Global,
|
Chicago |
Handbook of research on emerging developments in data privacy.
IGI Global,
2015.
|
|
|
Securing the virtual environment : how to defend the enterprise against attack
|
APA |
(2012).
Securing the virtual environment : how to defend the enterprise against
attack,
New Delhi:
Wiley India Pvt. Ltd.
|
MLA |
Securing the virtual environment : how to defend the enterprise against
attack.
New Delhi:
Wiley India Pvt. Ltd,
2012.
|
Harvard |
2012.
Securing the virtual environment : how to defend the enterprise against attack
.
Wiley India Pvt. Ltd,
|
Chicago |
Securing the virtual environment : how to defend the enterprise against attack
.
Wiley India Pvt. Ltd,
2012.
|
|
|
CompTIA security + (Exam SYO-301) : training kit |
APA |
(2014).
CompTIA security + (Exam SYO-301) : training kit,
New Delhi:
PHI Learning Private Limited.
|
MLA |
CompTIA security + (Exam SYO-301) : training kit.
New Delhi:
PHI Learning Private Limited,
2014.
|
Harvard |
2014.
CompTIA security + (Exam SYO-301) : training kit.
PHI Learning Private Limited,
|
Chicago |
CompTIA security + (Exam SYO-301) : training kit.
PHI Learning Private Limited,
2014.
|
|
|
Network security |
APA |
(2013).
Network security,
New Delhi:
S. K. Kataria & Sons.
|
MLA |
Network security.
New Delhi:
S. K. Kataria & Sons,
2013.
|
Harvard |
2013.
Network security.
S. K. Kataria & Sons,
|
Chicago |
Network security.
S. K. Kataria & Sons,
2013.
|
|
|
Information security management handbook |
APA |
(2012).
Information security management handbook,
London:
CRC Press/ Taylor & Francis.
|
MLA |
Information security management handbook.
London:
CRC Press/ Taylor & Francis,
2012.
|
Harvard |
2012.
Information security management handbook.
CRC Press/ Taylor & Francis,
|
Chicago |
Information security management handbook.
CRC Press/ Taylor & Francis,
2012.
|
|
|
Computer security: principles and practice
|
APA |
(2015).
Computer security: principles and practice
,
Boston:
Pearson Education Limited.
|
MLA |
Computer security: principles and practice
.
Boston:
Pearson Education Limited,
2015.
|
Harvard |
2015.
Computer security: principles and practice
.
Pearson Education Limited,
|
Chicago |
Computer security: principles and practice
.
Pearson Education Limited,
2015.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2014).
Cryptography and network security: principles and practice,
Boston:
Pearson Education Limited.
|
MLA |
Cryptography and network security: principles and practice.
Boston:
Pearson Education Limited,
2014.
|
Harvard |
2014.
Cryptography and network security: principles and practice.
Pearson Education Limited,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Education Limited,
2014.
|
|
|
Core software security : security at the source |
APA |
(2014).
Core software security : security at the source,
London:
CRC Press, Taylor & Francis Group .
|
MLA |
Core software security : security at the source.
London:
CRC Press, Taylor & Francis Group ,
2014.
|
Harvard |
2014.
Core software security : security at the source.
CRC Press, Taylor & Francis Group ,
|
Chicago |
Core software security : security at the source.
CRC Press, Taylor & Francis Group ,
2014.
|
|
|
Secure and resilient software development |
APA |
(2010).
Secure and resilient software development,
London:
CRC Press/Taylor & Francis Group.
|
MLA |
Secure and resilient software development.
London:
CRC Press/Taylor & Francis Group,
2010.
|
Harvard |
2010.
Secure and resilient software development.
CRC Press/Taylor & Francis Group,
|
Chicago |
Secure and resilient software development.
CRC Press/Taylor & Francis Group,
2010.
|
|
|
Secure software design |
APA |
(2013).
Secure software design,
Burlington:
Johnes & Bartlett Learning.
|
MLA |
Secure software design.
Burlington:
Johnes & Bartlett Learning,
2013.
|
Harvard |
2013.
Secure software design.
Johnes & Bartlett Learning,
|
Chicago |
Secure software design.
Johnes & Bartlett Learning,
2013.
|
|
|
Principles of information security |
APA |
(2016).
Principles of information security,
Boston:
Cengage Learning.
|
MLA |
Principles of information security.
Boston:
Cengage Learning,
2016.
|
Harvard |
2016.
Principles of information security.
Cengage Learning,
|
Chicago |
Principles of information security.
Cengage Learning,
2016.
|
|
|
The web application : hacker's handbook |
APA |
(2011).
The web application : hacker's handbook,
Indianapolis:
Wiley Publishing , Inc..
|
MLA |
The web application : hacker's handbook.
Indianapolis:
Wiley Publishing , Inc.,
2011.
|
Harvard |
2011.
The web application : hacker's handbook.
Wiley Publishing , Inc.,
|
Chicago |
The web application : hacker's handbook.
Wiley Publishing , Inc.,
2011.
|
|
|
Computer security fundamentals |
APA |
(2016).
Computer security fundamentals,
Indianapolis:
Pearson Education.
|
MLA |
Computer security fundamentals.
Indianapolis:
Pearson Education,
2016.
|
Harvard |
2016.
Computer security fundamentals.
Pearson Education,
|
Chicago |
Computer security fundamentals.
Pearson Education,
2016.
|
|
|
Security + guide to network security fundamentals |
APA |
(2018).
Security + guide to network security fundamentals,
Australia:
Cengage Learning.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Cengage Learning,
2018.
|
Harvard |
2018.
Security + guide to network security fundamentals.
Cengage Learning,
|
Chicago |
Security + guide to network security fundamentals.
Cengage Learning,
2018.
|
|
|
Foundations of information security : a straightforward introduction |
APA |
(2019).
Foundations of information security : a straightforward introduction,
San Francisco:
No Starch Press.
|
MLA |
Foundations of information security : a straightforward introduction.
San Francisco:
No Starch Press,
2019.
|
Harvard |
2019.
Foundations of information security : a straightforward introduction.
No Starch Press,
|
Chicago |
Foundations of information security : a straightforward introduction.
No Starch Press,
2019.
|
|
|
Security of web developers |
APA |
(2016).
Security of web developers,
Beijing:
O'Reilly Media.
|
MLA |
Security of web developers.
Beijing:
O'Reilly Media,
2016.
|
Harvard |
2016.
Security of web developers.
O'Reilly Media,
|
Chicago |
Security of web developers.
O'Reilly Media,
2016.
|
|
|
Security + guide to network security fundamentals |
APA |
(2012).
Security + guide to network security fundamentals,
Australia:
Course Technology.
|
MLA |
Security + guide to network security fundamentals.
Australia:
Course Technology,
2012.
|
Harvard |
2012.
Security + guide to network security fundamentals.
Course Technology,
|
Chicago |
Security + guide to network security fundamentals.
Course Technology,
2012.
|
|
|
Fintech law in a nutshell |
APA |
(2020).
Fintech law in a nutshell,
Paul, MN.:
West Academic Publishing.
|
MLA |
Fintech law in a nutshell.
Paul, MN.:
West Academic Publishing,
2020.
|
Harvard |
2020.
Fintech law in a nutshell.
West Academic Publishing,
|
Chicago |
Fintech law in a nutshell.
West Academic Publishing,
2020.
|
|
|
Cybersecurity risk management : mastering the fundamentals using the NIST
cybersecurity framework |
APA |
(2022).
Cybersecurity risk management : mastering the fundamentals using the NIST
cybersecurity framework,
Hoboken:
John Wiley & Sons.
|
MLA |
Cybersecurity risk management : mastering the fundamentals using the NIST
cybersecurity framework.
Hoboken:
John Wiley & Sons,
2022.
|
Harvard |
2022.
Cybersecurity risk management : mastering the fundamentals using the NIST
cybersecurity framework.
John Wiley & Sons,
|
Chicago |
Cybersecurity risk management : mastering the fundamentals using the NIST
cybersecurity framework.
John Wiley & Sons,
2022.
|
|
|
Information security: principles and practice |
APA |
(2022).
Information security: principles and practice,
Hoboken, New Jersey:
Wiley .
|
MLA |
Information security: principles and practice.
Hoboken, New Jersey:
Wiley ,
2022.
|
Harvard |
2022.
Information security: principles and practice.
Wiley ,
|
Chicago |
Information security: principles and practice.
Wiley ,
2022.
|
|
|
Cryptography and network security: principles and practice |
APA |
(2023).
Cryptography and network security: principles and practice,
Boston:
Pearson Education Limited.
|
MLA |
Cryptography and network security: principles and practice.
Boston:
Pearson Education Limited,
2023.
|
Harvard |
2023.
Cryptography and network security: principles and practice.
Pearson Education Limited,
|
Chicago |
Cryptography and network security: principles and practice.
Pearson Education Limited,
2023.
|
|
|
Fintech : hacking, blockchain, big data, cryptocurrency (financial
technology, smart contracts, digital banking, Internet technology) |
APA |
(2017).
Fintech : hacking, blockchain, big data, cryptocurrency (financial
technology, smart contracts, digital banking, Internet technology) ,
UK:
EPR Bublishing.
|
MLA |
Fintech : hacking, blockchain, big data, cryptocurrency (financial
technology, smart contracts, digital banking, Internet technology) .
UK:
EPR Bublishing,
2017.
|
Harvard |
2017.
Fintech : hacking, blockchain, big data, cryptocurrency (financial
technology, smart contracts, digital banking, Internet technology) .
EPR Bublishing,
|
Chicago |
Fintech : hacking, blockchain, big data, cryptocurrency (financial
technology, smart contracts, digital banking, Internet technology) .
EPR Bublishing,
2017.
|
|
|
Fundamentals of information systems security |
APA |
(2023).
Fundamentals of information systems security,
Burlington:
Jones & Bartlett Learning.
|
MLA |
Fundamentals of information systems security.
Burlington:
Jones & Bartlett Learning,
2023.
|
Harvard |
2023.
Fundamentals of information systems security.
Jones & Bartlett Learning,
|
Chicago |
Fundamentals of information systems security.
Jones & Bartlett Learning,
2023.
|