Books on the topic 'Attack on the network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Attack on the network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
College), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.
Find full textHarrison, R. F. Neur al networks,heart attack and bayesian decisions: An application oof the Boltzmann perceptron network. Sheffield: University of Sheffield, Dept. of Automatic Control & Systems Engineering, 1994.
Find full textProwell, Stacy J. Seven deadliest network attacks. Burlington, MA: Syngress, 2010.
Find full textMonte, Matthew. Network Attacks & Exploitation. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183440.
Full textRob, Kraus, and Borkin Mike, eds. Seven deadliest network attacks. Amsterdam: Syngress, 2010.
Find full textNetwork security attacks and countermeasures. Hershey, PA: Information Science Reference, 2015.
Find full textPerez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Amsterdam: Syngress, 2010.
Find full textKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. [Espoo, Finland]: VTT Technical Research Centre of Finland, 2005.
Find full textWilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Find full textZhou, Qing. Network Robustness under Large-Scale Attacks. New York, NY: Springer New York, 2013.
Find full textZhou, Qing, Long Gao, Ruifang Liu, and Shuguang Cui. Network Robustness under Large-Scale Attacks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4860-0.
Full textE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.
Find full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. New York: Springer, 2008.
Find full textHack attacks denied: A complete guide to network lockdown. New York: Wiley, 2001.
Find full textCobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Find full textUlkoasiainministeriö, Finland, ed. A battle in bits and bytes: Computer network attacks and the law of armed conflicts. Helsinki: Erik Castrén Institute of International Law and Human Rights, 2009.
Find full textAl-Qaeda: In search of the terror network that threatens the world. New York: Thunder Mouth Press/Nation Books, 2002.
Find full textAl-Qaeda: In search of the terror network that threatens the world. New York: Thunder Mouth Press/Nation Books, 2003.
Find full textHack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.
Find full textCreating a nationwide integrated biosurveillance network: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 11, 2006. Washington: U.S. G.P.O., 2007.
Find full textK, Kokula Krishna Hari, ed. Preventing Jamming Attacks in Wireless Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Find full textParker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. San Diego, CA: ICON Health, 2004.
Find full textParker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. San Diego, CA: ICON Health Publications, 2003.
Find full textHardcastle, Michael. Attack! London: Severn, 1986.
Find full textFred, Reinfeld. Attack & counter attack in chess. New York: Harper & Row, 1986.
Find full textMonster Attack Network. AiT/PlanetLar, 2007.
Find full textUnderstanding Network Hacks: Attack and Defense with Python. Springer, 2015.
Find full textAn Analysis of the Computer and Network Attack Taxonomy. Storming Media, 2001.
Find full textApplied Network Security: Proven tactics to detect and defend against all kinds of network attack. Packt Publishing - ebooks Account, 2017.
Find full textAttack of the 50 Foot Sister: Dexter's Laboratory (Cartoon Network). Golden Books Publishing Company, 2000.
Find full textBusiness Architecture Model for Network Centric Surface Combatant Land Attack Warfare. Storming Media, 2001.
Find full textTrabelsi, Zouheir, Kadhim Hayawi, Arwa Al Braiki, and Sujith Samuel Mathew. Network Attacks and Defenses. Auerbach Publications, 2012. http://dx.doi.org/10.1201/b13098.
Full textSeven Deadliest Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/c2009-0-61914-0.
Full textNetwork Robustness Under Largescale Attacks. Springer, 2012.
Find full textSeven Deadliest Social Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/c2009-0-61910-3.
Full textBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Full textInside the terror network. Alexandria, VA: PBS Video, 2002.
Find full textRedefining Attack: Taking the Offensive Against Networks. Storming Media, 2003.
Find full textMonte, Matthew. Network Attacks and Exploitation: A Framework. Wiley & Sons, Incorporated, John, 2015.
Find full textMonte, Matthew. Network Attacks and Exploitation: A Framework. Wiley & Sons, Incorporated, John, 2015.
Find full textZhou, Qing, Ruifang Liu, and Long Gao. Network Robustness under Large-Scale Attacks. Springer, 2012.
Find full textStuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.
Find full textStuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.
Find full textC, Jorgensen Charles, Ross James C, and Ames Research Center, eds. Neural network prediction of new aircraft design coefficients. Moffett Field, Calif: National Aeronautics and Space Administration, Ames Research Center, 1997.
Find full textStaff, EC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2009.
Find full textCategorizing Network Attacks Using Pattern Classification Algorithms. Storming Media, 2002.
Find full textNetwork Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.
Find full textChirillo, John. Hack Attacks Denied: Complete Guide to Network LockDown. John Wiley & Sons, 2001.
Find full textMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Find full textDistributed Denial of Service Attack and Defense. Springer, 2013.
Find full text