Bücher zum Thema „Security attacks detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-32 Bücher für die Forschung zum Thema "Security attacks detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Den vollen Inhalt der Quelle findenRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Den vollen Inhalt der Quelle findenNelson A. Rockefeller Institute of Government., Hrsg. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Den vollen Inhalt der Quelle findenBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts.: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington: U.S. G.P.O., 2005.
Den vollen Inhalt der Quelle findenAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling: Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials: How effective is available technology? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenRaghavan, S. V., und E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Den vollen Inhalt der Quelle findenRaghavan, S. V., und E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Den vollen Inhalt der Quelle findenSaxe, Joshua, und Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Den vollen Inhalt der Quelle findenRash, Michael. Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, 2007.
Den vollen Inhalt der Quelle findenSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Der volle Inhalt der QuelleSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Den vollen Inhalt der Quelle findenFalco, Gregory J., und Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Der volle Inhalt der QuelleAmishav-Zlatin, Josh, OWASP Foundation Staff, John Melton, Dennis Groves und Colin Watson. AppSensor Guide : Application-Specific Real Time Attack Detection and Response: Version 2.0. Lulu Press, Inc., 2014.
Den vollen Inhalt der Quelle findenBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Den vollen Inhalt der Quelle findenSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Den vollen Inhalt der Quelle findenSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Den vollen Inhalt der Quelle findenSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Taylor & Francis Group, 2017.
Den vollen Inhalt der Quelle findenSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Den vollen Inhalt der Quelle findenBrancik, Kenneth. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Den vollen Inhalt der Quelle findenBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Den vollen Inhalt der Quelle findenBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Den vollen Inhalt der Quelle findenParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Den vollen Inhalt der Quelle findenDhs Coordination of Nuclear Detection Efforts: Hearing Before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Home. Not Avail, 2005.
Den vollen Inhalt der Quelle findenStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2022.
Den vollen Inhalt der Quelle findenStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Den vollen Inhalt der Quelle findenStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Den vollen Inhalt der Quelle finden