Books on the topic 'Adversarial Defence'

To see the other types of publications on this topic, follow the link: Adversarial Defence.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Adversarial Defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rose, Clive. Campaigns against western defence: NATO's adversaries and critics. 2nd ed. Basingstoke: Macmillan, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rose, Clive. Campaigns against western defence: NATO's adversaries and critics. New York: St. Martin's Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campaigns against Western defence: NATO's adversaries and critics. Basingstoke: Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rose, Clive. Campaigns against Western defence: NATO's adversaries and critics. Basingstoke: Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Campaigns against western defence: NATO's adversaries and critics. 2nd ed. Houndmills, Basingstoke, Hampshire: Macmillan, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Don, Bruce W. Allies and adversaries: Policy insights into strategic defense relationships. Santa Monica, CA (P.O. Box 2138, Santa Monica 90406-2138): Rand Corp., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hoffman, Bruce. A reassessment of potential adversaries to U.S. nuclear programs. Santa Monica, CA: Rand, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cairns, David J.A. (David John Adams), 1961-. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford : Toronto: Clarendon Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cairns, David J. A. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford: Clarendon Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dunay, Pál. Adversaries all around?: (re)nationalization of security and defence policies in Central and Eastern Europe. The Hague: Netherlands Institute of International Relations Clingendael, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

C, Kimball John. Europe and North America: An atlas-almanac of allies and adversaries. New York, NY: Foreign Policy Association, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lincoln's defense of politics: The public man and his opponents in the crisis over slavery. Columbia: University of Missouri Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Adversarial tradecraft in cybersecurity: Offense versus defence in real-time computer conflict. Birmingham uk: Packt publishing, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Adversarial Deep Learning in Cybersecurity: Attack Taxonomies, Defence Mechanisms, and Learning Theories. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rose, Clive. Campaigns Against Western Defence: NATO's Adversaries and Critics. Palgrave Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rose, Clive. Campaigns Against Western Defence: NATO's Adversaries and Critics. Palgrave Macmillan, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Campaigns Against Western Defense: Nato's Adversaries and Critics. Palgrave Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jajodia, Sushil, Anup K. Ghosh, and V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Borges, Dan. Adversarial Tradecraft in Cybersecurity: Offense Versus Defense in Real-Time Computer Conflict. Packt Publishing, Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

McConville, Mike, and Luke Marsh. The Myth of Judicial Independence. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198822103.001.0001.

Full text
Abstract:
This book on the criminal justice system is uniquely positioned to examine judicial claims to independence, the politics of the judiciary, the rule of law, and the role of the executive in the context of a democratic polity. The authors have mined the British government’s archival vaults to assemble records including official (previously classified) Home Office files and present a ground-breaking narrative. By tracking the relationship between senior judges and the Home Office from the end of the nineteenth century to the modern day, revelations concerning the politics of the judiciary and the separation of powers are unearthed. The book argues that the claims of the senior judiciary to be independent of the executive are invalidated by historical records and the theory and practice of the separation of powers (the ‘Westminster Model’) deeply flawed. Rather, at every material point, civil servants compromised the role of the senior judiciary’s decision-making. Moreover, with the passive endorsement of senior judges, the executive repeatedly misled Parliament as to the authorship and provenance of fundamental rules governing the relationship of the individual to the state in relation to police powers of arrest, detention, and questioning. The book also explores the past and continuing impact of all this to former colonial territories and traces the close liaison between key members of the senior judiciary and the state in reconfiguring the modern criminal process in a way which weakens defence lawyers, pressurizes defendants into pleading guilty, and undermines cardinal adversarial protections.
APA, Harvard, Vancouver, ISO, and other styles
33

Los adversarios de la ficción : una defensa de la literatura. Universidad de Cartagena, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Whittier, Nancy. Opposition to Pornography. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190235994.003.0002.

Full text
Abstract:
Chapter 2 shows how antipornography feminists and conservatives were ideologically opposed to each other but briefly engaged with some of the same governmental bodies in the 1980s. The chapter challenges the accepted story that feminists made common cause with conservatives. It defines them as collaborative adversaries, who staked out distinct positions and collaborated covertly, each hoping to use the other to advance their own agenda. Both sides interacted with municipal governments, the federal Attorney General’s Commission on the Status of Pornography (i.e., Meese Commission), and Congress. Activism and Congressional attention to pornography peaked during two different periods. During the years of peak activity, 1982‒1988, when feminists and conservatives were both highly mobilized; feminist frames emphasizing harms to women gained ground and legal obscenity enforcement grew. Their greater political power gave conservatives more influence than feminists. Between 1997‒2006, congressional attention peaked again; conservatives remained active on the issue, but feminists were sidelined and pornography was framed primarily as harmful to children. The chapter discusses feminist conflict over pornography and how participants in collaborative adversarial relationships defend their reputations. The chapter also covers the changing legal and policy landscape for federal obscenity enforcement.
APA, Harvard, Vancouver, ISO, and other styles
35

Varieties of Legal Order: The Politics of Adversarial and Bureaucratic Legalism. Routledge, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Barnes, Jeb, and Thomas F. Burke. Varieties of Legal Order: The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Barnes, Jeb, and Thomas F. Burke. Varieties of Legal Order: The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Varieties of Legal Order: The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jajodia, Sushil, Michael Wellman, Peng Liu, Cliff Wang, and George Cybenko. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Leuprecht, Christian, and Hayley McNorton. Intelligence as Democratic Statecraft. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192893949.001.0001.

Full text
Abstract:
Democracy needs to be defended, and intelligence is the first line of defence. However, the liberal-democratic norm of limited state intervention in the lives of citizens means that security and accountability are in tension insofar as their first principles are diametrically opposed: whereas openness and transparency are hallmarks of democratic governance, operational secrecy—in relation to other states, to democratic society, and to other parts of government—is the essence of intelligence tradecraft. Intelligence accountability reconciles democracy and security through transparent standards, guidelines, legal frameworks, executive directives, and international law. Evolving executive, legislative, judicial, and bureaucratic mechanisms for intelligence oversight and review have become a distinct feature of democratic regimes. Over recent decades legislative and judicial components have been added to complement administrative and executive accountability. Using a most-similar systems design to compare intelligence accountability in the United States, the United Kingdom, Canada, Australia, and New Zealand, this book expands compliance as the sine qua non of intelligence to gauge effectiveness, efficiency, and innovation across the intelligence community. In the context of changing technology and threat vectors that have significantly affected, altered, and expanded the role, powers, and capabilities of intelligence, this book compares the institutions, composition, practices, characteristics, and cultures of intelligence accountability systems across the world’s oldest and most powerful intelligence alliance. In an asymmetric struggle against unprincipled adversaries, accountability has to reassure a sceptical public that the intelligence and security community plays by the same rules that democracies are committed to defend.
APA, Harvard, Vancouver, ISO, and other styles
41

Freilich, Charles D. The Military Response Today. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0008.

Full text
Abstract:
Chapter 7 assesses Israel’s military responses to the primary threats it now faces. It argues that Israel has gained overwhelming conventional superiority, but that it is unclear whether it could have effectively attacked Iran’s nuclear program. Israel has reduced terrorism to a level its society can tolerate, but it remains a strategic threat, nevertheless. Israel does not yet appear to have an offensive response to the Hezbollah and Hamas threats, at an acceptable price, requiring greater emphasis on defense. Conversely, there have been over 10 years of quiet with Hezbollah, partly because of the deterrence gained in 2006. Israel’s rocket defenses largely neutralized the Hamas threat during the 2014 operation, and if a similar lull is gained with Hamas, limited deterrence will have been achieved. The real challenge is Hezbollah’s rocket arsenal. Israel has become a global leader in cybersecurity but is concerned that its adversaries will narrow the gap.
APA, Harvard, Vancouver, ISO, and other styles
42

Clark, J. P. Military Operations and the Defense Department. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.20.

Full text
Abstract:
This article examines the U.S. military’s plans for carrying out combined joint operations across multiple theaters and domains in the twenty-first century. It summarizes the most likely strategic and operational approaches available to future adversaries, such as anti-access/area denial (A2/AD), gray zone warfare, and other asymmetric methods. The article also considers the respective challenges posed by the two likely catalysts for military operations: contested norms and persistent disorder. The U.S. military response to this strategic context is still forming, but there are common themes among the services: the recognition that future operations will entail greater risk; the need to disperse forces to survive on a more lethal battlefield; a desire to create networked forces attacking with a combination of physical and nonphysical (cyber and electronic warfare); and a rebalancing of force structure in terms of both weapon sophistication and mission type.
APA, Harvard, Vancouver, ISO, and other styles
43

Sperling, James, and Mark Webber. NATO Operations. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0052.

Full text
Abstract:
In the post-cold-war period, NATO’s mission has shifted from static territorial defence against a well-defined adversary to expeditionary missions against ill-defined adversaries along the entire conflict spectrum. We trace the evolution of NATO security strategies and the attendant changes in allied threat perception, purpose, and force structure, the range and kinds of military operations between 1990 and 2016, and military exercises undertaken after the Russian annexation of Crimea. We then assess allied contributions to those operations (burden- and risk-sharing) and the selective participation of allies in operations (risk-assuming and risk-shirking). A final substantive concern is the growing capabilities gap among the allies, its implications for future allied operations, and its consequences for the alliance. The conclusion addresses the key question facing the alliance: should NATO abandon expeditionary operations and return to static territorial defence consistent with the original intent of the North Atlantic Treaty?
APA, Harvard, Vancouver, ISO, and other styles
44

Pfeifer, Michael J. Introduction. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036132.003.0001.

Full text
Abstract:
This introductory chapter discusses the gaps in current American lynching historiography, noting that, while several recent studies of lynching have enhanced our understanding of the history of the rhetoric surrounding the term lynching, they have only peripherally addressed the very real practices of collective violence that the word actually connoted in particular times and places. In addition, the chapter provides a brief overview of American lynching, which arose in the early to mid-nineteenth century as a response to alterations in law and social values (the shift from a penology of retribution and deterrence to one centered on reform of the criminal, the rise of the adversarial system and aggressive defense lawyering, the shift from private to public criminal prosecution, and the professionalization of criminal justice) that occurred throughout the Anglo-American world.
APA, Harvard, Vancouver, ISO, and other styles
45

Fernández García, Francisco. La descortesía en el debate electoral cara a cara. 2018th ed. Editorial Universidad de Sevilla, 2018. http://dx.doi.org/10.12795/9788447221363.

Full text
Abstract:
El debate electoral cara a cara es, probablemente, la máxima expresión mediática de las democracias modernas. Ante millones de espectadores, los candidatos se juegan en él buena parte de sus opciones de victoria, en una batalla dialéctica articulada en torno a dos claves esenciales: la defensa de las propias posiciones y el ataque contra las del adversario. El presente libro, desde el anclaje teórico de la (des)cortesía lingüística, se centra en la segunda de dichas vertientes del debate, la vertiente destructiva, presentando las estrategias y los mecanismos de los que se sirven los oradores para dañar la imagen del adversario ante las audiencias y tratar de alejarlo, de este modo, de la victoria electoral. Dicha exposición parte de un análisis minucioso y sistemático del cara a cara que enfrentó a Mariano Rajoy y Alfredo Pérez Rubalcaba en la campaña previa a las elecciones generales españolas de noviembre de 2011.
APA, Harvard, Vancouver, ISO, and other styles
46

Sharpe, Gregory. An Argument in Defence of Christianity, Taken from the Concessions of the Most Antient Adversaries, Jews and Pagans, Philosophers and Historians. ... by Gregory Sharpe,. Gale Ecco, Print Editions, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hodgson, Jacqueline S. The Metamorphosis of Criminal Justice. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199981427.001.0001.

Full text
Abstract:
The focus of this book is the potentially radical and fundamental changes that are taking place within criminal justice in Britain and in France and the ways that these are driven by wider domestic, European, or international concerns. This metamorphosis away from established values and practices is eroding what were once regarded as core rights and freedoms in the name of efficiency, security, and justice to victims. Beginning with a comparative analysis of adversarial and inquisitorial procedural values and traditions, and an examination of broad trends in domestic and European criminal justice, the book then discusses how the roles of prosecution and defense have been reshaped in different ways in both jurisdictions—both in the text of the law and in their practices. The final part considers how systems within different procedural traditions adapt to address, or provide a remedy for, systemic flaws that produce wrongful convictions and, in particular, the role of the defense in these procedures. By adopting a comparative approach with France, the study explores the nature and reach of these trends, the ways that they challenge and disrupt criminal processes and values, and the contrasting responses that they provoke. It reveals how criminal justice traditions continue to be shaped in different ways by broader policy and political concerns; how different systems adapt, change, and distort when faced with (sometimes conflicting) pressures domestically and externally; and how different procedural values may serve to structure or limit reform, and so work to facilitate or resist change.
APA, Harvard, Vancouver, ISO, and other styles
48

Thomas, Stackhouse. A Defence of the Christian Religion from the Several Objections of Modern Antiscripturists. ... in Which Is Included the Whole State of the ... His Adversaries the Second Edition Corrected. Gale Ecco, Print Editions, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Schneider, Thomas E. Lincoln's Defense of Politics: The Public Man And His Opponents in the Crisis over Slavery (Shades of Blue and Gray). University of Missouri Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Contributors, Multiple. The Battle of the Quills: Wilkes Attacked and Defended. an Impartial Selection of All the Most Interesting Pieces, in Prose and Verse, Relative to ... His Adversaries, His Partisans, and Himself. Gale Ecco, Print Editions, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography