Livres sur le sujet « Adversarial Defence »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Adversarial Defence.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs livres pour votre recherche sur le sujet « Adversarial Defence ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les livres sur diverses disciplines et organisez correctement votre bibliographie.

1

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang et Michael Wellman, dir. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Hausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Hausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rose, Clive. Campaigns against western defence : NATO's adversaries and critics. 2e éd. Basingstoke : Macmillan, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Rose, Clive. Campaigns against western defence : NATO's adversaries and critics. New York : St. Martin's Press, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Campaigns against Western defence : NATO's adversaries and critics. Basingstoke : Macmillan, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Rose, Clive. Campaigns against Western defence : NATO's adversaries and critics. Basingstoke : Macmillan, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Campaigns against western defence : NATO's adversaries and critics. 2e éd. Houndmills, Basingstoke, Hampshire : Macmillan, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Jajodia, Sushil. Moving Target Defense II : Application of Game Theory and Adversarial Modeling. New York, NY : Springer New York, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Don, Bruce W. Allies and adversaries : Policy insights into strategic defense relationships. Santa Monica, CA (P.O. Box 2138, Santa Monica 90406-2138) : Rand Corp., 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Hoffman, Bruce. A reassessment of potential adversaries to U.S. nuclear programs. Santa Monica, CA : Rand, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Cairns, David J.A. (David John Adams), 1961-. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford : Toronto : Clarendon Press, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Cairns, David J. A. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford : Clarendon Press, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Dunay, Pál. Adversaries all around ? : (re)nationalization of security and defence policies in Central and Eastern Europe. The Hague : Netherlands Institute of International Relations Clingendael, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

C, Kimball John. Europe and North America : An atlas-almanac of allies and adversaries. New York, NY : Foreign Policy Association, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Lincoln's defense of politics : The public man and his opponents in the crisis over slavery. Columbia : University of Missouri Press, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Adversarial tradecraft in cybersecurity : Offense versus defence in real-time computer conflict. Birmingham uk : Packt publishing, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Adversarial Deep Learning in Cybersecurity : Attack Taxonomies, Defence Mechanisms, and Learning Theories. Springer International Publishing AG, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Rose, Clive. Campaigns Against Western Defence : NATO's Adversaries and Critics. Palgrave Macmillan, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Rose, Clive. Campaigns Against Western Defence : NATO's Adversaries and Critics. Palgrave Macmillan, 1987.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Campaigns Against Western Defense : Nato's Adversaries and Critics. Palgrave Macmillan, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup et X. Sean Wang. Moving Target Defense II : Application of Game Theory and Adversarial Modeling. Springer, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Jajodia, Sushil, Anup K. Ghosh et V. S. Subrahmanian. Moving Target Defense II : Application of Game Theory and Adversarial Modeling. Springer, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup et X. Sean Wang. Moving Target Defense II : Application of Game Theory and Adversarial Modeling. Springer, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Borges, Dan. Adversarial Tradecraft in Cybersecurity : Offense Versus Defense in Real-Time Computer Conflict. Packt Publishing, Limited, 2022.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

McConville, Mike, et Luke Marsh. The Myth of Judicial Independence. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198822103.001.0001.

Texte intégral
Résumé :
This book on the criminal justice system is uniquely positioned to examine judicial claims to independence, the politics of the judiciary, the rule of law, and the role of the executive in the context of a democratic polity. The authors have mined the British government’s archival vaults to assemble records including official (previously classified) Home Office files and present a ground-breaking narrative. By tracking the relationship between senior judges and the Home Office from the end of the nineteenth century to the modern day, revelations concerning the politics of the judiciary and the separation of powers are unearthed. The book argues that the claims of the senior judiciary to be independent of the executive are invalidated by historical records and the theory and practice of the separation of powers (the ‘Westminster Model’) deeply flawed. Rather, at every material point, civil servants compromised the role of the senior judiciary’s decision-making. Moreover, with the passive endorsement of senior judges, the executive repeatedly misled Parliament as to the authorship and provenance of fundamental rules governing the relationship of the individual to the state in relation to police powers of arrest, detention, and questioning. The book also explores the past and continuing impact of all this to former colonial territories and traces the close liaison between key members of the senior judiciary and the state in reconfiguring the modern criminal process in a way which weakens defence lawyers, pressurizes defendants into pleading guilty, and undermines cardinal adversarial protections.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Los adversarios de la ficción : una defensa de la literatura. Universidad de Cartagena, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Whittier, Nancy. Opposition to Pornography. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190235994.003.0002.

Texte intégral
Résumé :
Chapter 2 shows how antipornography feminists and conservatives were ideologically opposed to each other but briefly engaged with some of the same governmental bodies in the 1980s. The chapter challenges the accepted story that feminists made common cause with conservatives. It defines them as collaborative adversaries, who staked out distinct positions and collaborated covertly, each hoping to use the other to advance their own agenda. Both sides interacted with municipal governments, the federal Attorney General’s Commission on the Status of Pornography (i.e., Meese Commission), and Congress. Activism and Congressional attention to pornography peaked during two different periods. During the years of peak activity, 1982‒1988, when feminists and conservatives were both highly mobilized; feminist frames emphasizing harms to women gained ground and legal obscenity enforcement grew. Their greater political power gave conservatives more influence than feminists. Between 1997‒2006, congressional attention peaked again; conservatives remained active on the issue, but feminists were sidelined and pornography was framed primarily as harmful to children. The chapter discusses feminist conflict over pornography and how participants in collaborative adversarial relationships defend their reputations. The chapter also covers the changing legal and policy landscape for federal obscenity enforcement.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Varieties of Legal Order : The Politics of Adversarial and Bureaucratic Legalism. Routledge, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Barnes, Jeb, et Thomas F. Burke. Varieties of Legal Order : The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Barnes, Jeb, et Thomas F. Burke. Varieties of Legal Order : The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Varieties of Legal Order : The Politics of Adversarial and Bureaucratic Legalism. Taylor & Francis Group, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Jajodia, Sushil, Michael Wellman, Peng Liu, Cliff Wang et George Cybenko. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security. Springer, 2019.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Leuprecht, Christian, et Hayley McNorton. Intelligence as Democratic Statecraft. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192893949.001.0001.

Texte intégral
Résumé :
Democracy needs to be defended, and intelligence is the first line of defence. However, the liberal-democratic norm of limited state intervention in the lives of citizens means that security and accountability are in tension insofar as their first principles are diametrically opposed: whereas openness and transparency are hallmarks of democratic governance, operational secrecy—in relation to other states, to democratic society, and to other parts of government—is the essence of intelligence tradecraft. Intelligence accountability reconciles democracy and security through transparent standards, guidelines, legal frameworks, executive directives, and international law. Evolving executive, legislative, judicial, and bureaucratic mechanisms for intelligence oversight and review have become a distinct feature of democratic regimes. Over recent decades legislative and judicial components have been added to complement administrative and executive accountability. Using a most-similar systems design to compare intelligence accountability in the United States, the United Kingdom, Canada, Australia, and New Zealand, this book expands compliance as the sine qua non of intelligence to gauge effectiveness, efficiency, and innovation across the intelligence community. In the context of changing technology and threat vectors that have significantly affected, altered, and expanded the role, powers, and capabilities of intelligence, this book compares the institutions, composition, practices, characteristics, and cultures of intelligence accountability systems across the world’s oldest and most powerful intelligence alliance. In an asymmetric struggle against unprincipled adversaries, accountability has to reassure a sceptical public that the intelligence and security community plays by the same rules that democracies are committed to defend.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Freilich, Charles D. The Military Response Today. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0008.

Texte intégral
Résumé :
Chapter 7 assesses Israel’s military responses to the primary threats it now faces. It argues that Israel has gained overwhelming conventional superiority, but that it is unclear whether it could have effectively attacked Iran’s nuclear program. Israel has reduced terrorism to a level its society can tolerate, but it remains a strategic threat, nevertheless. Israel does not yet appear to have an offensive response to the Hezbollah and Hamas threats, at an acceptable price, requiring greater emphasis on defense. Conversely, there have been over 10 years of quiet with Hezbollah, partly because of the deterrence gained in 2006. Israel’s rocket defenses largely neutralized the Hamas threat during the 2014 operation, and if a similar lull is gained with Hamas, limited deterrence will have been achieved. The real challenge is Hezbollah’s rocket arsenal. Israel has become a global leader in cybersecurity but is concerned that its adversaries will narrow the gap.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Clark, J. P. Military Operations and the Defense Department. Sous la direction de Derek S. Reveron, Nikolas K. Gvosdev et John A. Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.20.

Texte intégral
Résumé :
This article examines the U.S. military’s plans for carrying out combined joint operations across multiple theaters and domains in the twenty-first century. It summarizes the most likely strategic and operational approaches available to future adversaries, such as anti-access/area denial (A2/AD), gray zone warfare, and other asymmetric methods. The article also considers the respective challenges posed by the two likely catalysts for military operations: contested norms and persistent disorder. The U.S. military response to this strategic context is still forming, but there are common themes among the services: the recognition that future operations will entail greater risk; the need to disperse forces to survive on a more lethal battlefield; a desire to create networked forces attacking with a combination of physical and nonphysical (cyber and electronic warfare); and a rebalancing of force structure in terms of both weapon sophistication and mission type.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Sperling, James, et Mark Webber. NATO Operations. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0052.

Texte intégral
Résumé :
In the post-cold-war period, NATO’s mission has shifted from static territorial defence against a well-defined adversary to expeditionary missions against ill-defined adversaries along the entire conflict spectrum. We trace the evolution of NATO security strategies and the attendant changes in allied threat perception, purpose, and force structure, the range and kinds of military operations between 1990 and 2016, and military exercises undertaken after the Russian annexation of Crimea. We then assess allied contributions to those operations (burden- and risk-sharing) and the selective participation of allies in operations (risk-assuming and risk-shirking). A final substantive concern is the growing capabilities gap among the allies, its implications for future allied operations, and its consequences for the alliance. The conclusion addresses the key question facing the alliance: should NATO abandon expeditionary operations and return to static territorial defence consistent with the original intent of the North Atlantic Treaty?
Styles APA, Harvard, Vancouver, ISO, etc.
44

Pfeifer, Michael J. Introduction. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036132.003.0001.

Texte intégral
Résumé :
This introductory chapter discusses the gaps in current American lynching historiography, noting that, while several recent studies of lynching have enhanced our understanding of the history of the rhetoric surrounding the term lynching, they have only peripherally addressed the very real practices of collective violence that the word actually connoted in particular times and places. In addition, the chapter provides a brief overview of American lynching, which arose in the early to mid-nineteenth century as a response to alterations in law and social values (the shift from a penology of retribution and deterrence to one centered on reform of the criminal, the rise of the adversarial system and aggressive defense lawyering, the shift from private to public criminal prosecution, and the professionalization of criminal justice) that occurred throughout the Anglo-American world.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Fernández García, Francisco. La descortesía en el debate electoral cara a cara. 2018e éd. Editorial Universidad de Sevilla, 2018. http://dx.doi.org/10.12795/9788447221363.

Texte intégral
Résumé :
El debate electoral cara a cara es, probablemente, la máxima expresión mediática de las democracias modernas. Ante millones de espectadores, los candidatos se juegan en él buena parte de sus opciones de victoria, en una batalla dialéctica articulada en torno a dos claves esenciales: la defensa de las propias posiciones y el ataque contra las del adversario. El presente libro, desde el anclaje teórico de la (des)cortesía lingüística, se centra en la segunda de dichas vertientes del debate, la vertiente destructiva, presentando las estrategias y los mecanismos de los que se sirven los oradores para dañar la imagen del adversario ante las audiencias y tratar de alejarlo, de este modo, de la victoria electoral. Dicha exposición parte de un análisis minucioso y sistemático del cara a cara que enfrentó a Mariano Rajoy y Alfredo Pérez Rubalcaba en la campaña previa a las elecciones generales españolas de noviembre de 2011.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Sharpe, Gregory. An Argument in Defence of Christianity, Taken from the Concessions of the Most Antient Adversaries, Jews and Pagans, Philosophers and Historians. ... by Gregory Sharpe,. Gale Ecco, Print Editions, 2018.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Hodgson, Jacqueline S. The Metamorphosis of Criminal Justice. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199981427.001.0001.

Texte intégral
Résumé :
The focus of this book is the potentially radical and fundamental changes that are taking place within criminal justice in Britain and in France and the ways that these are driven by wider domestic, European, or international concerns. This metamorphosis away from established values and practices is eroding what were once regarded as core rights and freedoms in the name of efficiency, security, and justice to victims. Beginning with a comparative analysis of adversarial and inquisitorial procedural values and traditions, and an examination of broad trends in domestic and European criminal justice, the book then discusses how the roles of prosecution and defense have been reshaped in different ways in both jurisdictions—both in the text of the law and in their practices. The final part considers how systems within different procedural traditions adapt to address, or provide a remedy for, systemic flaws that produce wrongful convictions and, in particular, the role of the defense in these procedures. By adopting a comparative approach with France, the study explores the nature and reach of these trends, the ways that they challenge and disrupt criminal processes and values, and the contrasting responses that they provoke. It reveals how criminal justice traditions continue to be shaped in different ways by broader policy and political concerns; how different systems adapt, change, and distort when faced with (sometimes conflicting) pressures domestically and externally; and how different procedural values may serve to structure or limit reform, and so work to facilitate or resist change.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Thomas, Stackhouse. A Defence of the Christian Religion from the Several Objections of Modern Antiscripturists. ... in Which Is Included the Whole State of the ... His Adversaries the Second Edition Corrected. Gale Ecco, Print Editions, 2018.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Schneider, Thomas E. Lincoln's Defense of Politics : The Public Man And His Opponents in the Crisis over Slavery (Shades of Blue and Gray). University of Missouri Press, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Contributors, Multiple. The Battle of the Quills : Wilkes Attacked and Defended. an Impartial Selection of All the Most Interesting Pieces, in Prose and Verse, Relative to ... His Adversaries, His Partisans, and Himself. Gale Ecco, Print Editions, 2018.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie