Libros sobre el tema "Security attacks detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 32 mejores mejores libros para su investigación sobre el tema "Security attacks detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Buscar texto completoRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Buscar texto completoNelson A. Rockefeller Institute of Government., ed. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Buscar texto completoBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Buscar texto completoUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
Buscar texto completoUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts.: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington: U.S. G.P.O., 2005.
Buscar texto completoAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling: Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington: U.S. G.P.O., 2007.
Buscar texto completoThe science of prevention: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington: U.S. G.P.O., 2007.
Buscar texto completoUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emergency Preparedness, Science, and Technology., ed. Detecting nuclear weapons and radiological materials: How effective is available technology? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington: U.S. G.P.O., 2007.
Buscar texto completoBhattacharyya, Dhruba Kumar y Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Buscar texto completoBhattacharyya, Dhruba Kumar y Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Buscar texto completoRaghavan, S. V. y E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Buscar texto completoRaghavan, S. V. y E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Buscar texto completoSaxe, Joshua y Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Buscar texto completoRash, Michael. Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, 2007.
Buscar texto completoSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Texto completoSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Buscar texto completoFalco, Gregory J. y Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Texto completoAmishav-Zlatin, Josh, OWASP Foundation Staff, John Melton, Dennis Groves y Colin Watson. AppSensor Guide : Application-Specific Real Time Attack Detection and Response: Version 2.0. Lulu Press, Inc., 2014.
Buscar texto completoBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Buscar texto completoSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Buscar texto completoSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Buscar texto completoCollaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Taylor & Francis Group, 2017.
Buscar texto completoSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Buscar texto completoBrancik, Kenneth. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Buscar texto completoBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Buscar texto completoBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Buscar texto completoParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Buscar texto completoDhs Coordination of Nuclear Detection Efforts: Hearing Before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Home. Not Avail, 2005.
Buscar texto completoStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2022.
Buscar texto completoStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Buscar texto completoStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Buscar texto completo