Books on the topic 'Attack on the network'

To see the other types of publications on this topic, follow the link: Attack on the network.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Attack on the network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

College), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harrison, R. F. Neur al networks,heart attack and bayesian decisions: An application oof the Boltzmann perceptron network. Sheffield: University of Sheffield, Dept. of Automatic Control & Systems Engineering, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prowell, Stacy J. Seven deadliest network attacks. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monte, Matthew. Network Attacks & Exploitation. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rob, Kraus, and Borkin Mike, eds. Seven deadliest network attacks. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Network security attacks and countermeasures. Hershey, PA: Information Science Reference, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Perez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. [Espoo, Finland]: VTT Technical Research Centre of Finland, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Qing. Network Robustness under Large-Scale Attacks. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhou, Qing, Long Gao, Ruifang Liu, and Shuguang Cui. Network Robustness under Large-Scale Attacks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4860-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

E, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. New York: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hack attacks denied: A complete guide to network lockdown. New York: Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ulkoasiainministeriö, Finland, ed. A battle in bits and bytes: Computer network attacks and the law of armed conflicts. Helsinki: Erik Castrén Institute of International Law and Human Rights, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Qaeda: In search of the terror network that threatens the world. New York: Thunder Mouth Press/Nation Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Qaeda: In search of the terror network that threatens the world. New York: Thunder Mouth Press/Nation Books, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hack Attacks Denied. New York: John Wiley & Sons, Ltd., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Creating a nationwide integrated biosurveillance network: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 11, 2006. Washington: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

K, Kokula Krishna Hari, ed. Preventing Jamming Attacks in Wireless Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Parker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. San Diego, CA: ICON Health, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Parker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. San Diego, CA: ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hardcastle, Michael. Attack! London: Severn, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Fred, Reinfeld. Attack & counter attack in chess. New York: Harper & Row, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Monster Attack Network. AiT/PlanetLar, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Understanding Network Hacks: Attack and Defense with Python. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

An Analysis of the Computer and Network Attack Taxonomy. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Applied Network Security: Proven tactics to detect and defend against all kinds of network attack. Packt Publishing - ebooks Account, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Attack of the 50 Foot Sister: Dexter's Laboratory (Cartoon Network). Golden Books Publishing Company, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Business Architecture Model for Network Centric Surface Combatant Land Attack Warfare. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Trabelsi, Zouheir, Kadhim Hayawi, Arwa Al Braiki, and Sujith Samuel Mathew. Network Attacks and Defenses. Auerbach Publications, 2012. http://dx.doi.org/10.1201/b13098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Seven Deadliest Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/c2009-0-61914-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Network Robustness Under Largescale Attacks. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Seven Deadliest Social Network Attacks. Elsevier, 2010. http://dx.doi.org/10.1016/c2009-0-61910-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Buchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.

Full text
Abstract:
This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not the intrusion was launched with offensive or defensive intent. The risk of misperception is real, and the threats enabled by a network intrusion are significant. Network intrusions offer the capacity for tailored cyber attacks, for more basic wiper attacks, for general intelligence collection and espionage, and for counterintelligence work. It is very difficult to determine the intentions of an intruder, and they can change very easily—all of which leads to the possibility of danger and animates the cybersecurity dilemma.
APA, Harvard, Vancouver, ISO, and other styles
37

Inside the terror network. Alexandria, VA: PBS Video, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Redefining Attack: Taking the Offensive Against Networks. Storming Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Monte, Matthew. Network Attacks and Exploitation: A Framework. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Monte, Matthew. Network Attacks and Exploitation: A Framework. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zhou, Qing, Ruifang Liu, and Long Gao. Network Robustness under Large-Scale Attacks. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Stuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Stuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

C, Jorgensen Charles, Ross James C, and Ames Research Center, eds. Neural network prediction of new aircraft design coefficients. Moffett Field, Calif: National Aeronautics and Space Administration, Ames Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Staff, EC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Categorizing Network Attacks Using Pattern Classification Algorithms. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Network Attacks And Defenses A Handson Approach. Taylor & Francis Ltd, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chirillo, John. Hack Attacks Denied: Complete Guide to Network LockDown. John Wiley & Sons, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Distributed Denial of Service Attack and Defense. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography