Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Distributed attacks.

Livres sur le sujet « Distributed attacks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 34 meilleurs livres pour votre recherche sur le sujet « Distributed attacks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les livres sur diverses disciplines et organisez correctement votre bibliographie.

1

Brooks, Richard R., et İlker Özçelik. Distributed Denial of Service Attacks. Boca Raton : CRC Press, 2020. : Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Yu, Shui. Distributed Denial of Service Attack and Defense. New York, NY : Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9491-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [New York, N.Y.?] : [publisher not identified], 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Singh, Rajeev, et Mangey Ram, dir. Distributed Denial of Service Attacks. De Gruyter, 2021. http://dx.doi.org/10.1515/9783110619751.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Distributed Denial of Service Attacks. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Distributed Denial of Service (ddos) Attacks. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Gupta, Brij B., et Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Gupta, Brij B., et Amrita Dahiya. Distributed Denial of Service Attacks : Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Gupta, Brij B., et Amrita Dahiya. Distributed Denial of Service Attacks : Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gupta, Brij B., et Amrita Dahiya. Distributed Denial of Service Attacks : Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Gupta, Brij B., et Amrita Dahiya. Distributed Denial of Service Attacks : Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Ram, Mangey, et Rajeev Singh. Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Ram, Mangey, et Rajeev Singh. Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Brooks, Richard, et İlker Özçelik. Distributed Denial of Service Attacks : Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Brooks, Richard, et Ilker Ozcelik. Distributed Denial of Service Attacks : Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Ram, Mangey, et Rajeev Singh. Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Brooks, Richard, et Ilker Ozcelik. Distributed Denial of Service Attacks : Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Brooks, Richard, et Ilker Ozcelik. Distributed Denial of Service Attacks : Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Brooks, Richard, et Ilker Ozcelik. Distributed Denial of Service Attacks : Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Using Network Management Systems to Detect Distributed Denial of Service Attacks. Storming Media, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Distributed Denial of Service Attack and Defense. Springer, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks. Storming Media, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Government, U. S., Department of Defense et U. S. Army. Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service Attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism. Independently Published, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Distributed Functions of Emergency Management and Homeland Security : An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Distributed Functions of Emergency Management and Homeland Security : An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Distributed Functions of Emergency Management and Homeland Security : An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Department of Defense. Cyberterrorism after Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U. S. Infrastructure Vulnerabilities, Al-Qaeda Computer Capability, PC Attacks. Independently Published, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Department of Defense. Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-Of-Service (DDOS). Independently Published, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Kraska, James, et Raul Pedrozo. Disruptive Technology and the Law of Naval Warfare. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197630181.001.0001.

Texte intégral
Résumé :
Disruptive technologies have transformed conflict at sea, creating a dynamic and distributed operational environment that extends from the oceans to encompass warfare on land, in the air, outer space, and cyberspace. Naval warfare throughout this integrated multi-domain, networked seascape raises choice of law decisions that include the law of naval warfare and the law of armed conflict; neutrality law; and the peacetime regimes that apply to the oceans, airspace, outer space, and cyberspace. The international law in networked naval warfare must contend with autonomous vessels and aircraft, artificial intelligence, and long-range precision strike missiles that can close the “kill chain” at sea and beyond. The asymmetrical use of merchant ships and blockchain shipping in naval operations, opening the seabed as a new dimension of undersea warfare, and sophisticated attacks against submarine cables and space satellites pose new operational and legal dilemmas. Navigating this broader conception of the international law of naval warfare requires an understanding of emerging operational capabilities and concepts throughout the spectrum of conflict and the selection and integration of distinct legal regimes.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Sher, George. Doing Justice to Desert. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198801221.003.0005.

Texte intégral
Résumé :
Does justice require that goods be distributed in accordance with people’s deserts? The claim that it does is appealing, but has been the target of many objections. The current paper first argues briefly against three of these familiar objections, but then introduces another objection that has more force. Given this new objection, we cannot plausibly say that what justice requires is that each person gets what he deserves. However, even if desert plays no role in structuring the distribution of options among persons, it may still enter by affecting the pay-offs that attach to the various options. The paper’s final section defends this proposal by arguing that it can plausibly be paired with each of four major approaches to justice.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Government, U. S., U. S. Military et Department of Defense. Cyber War : The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service , Resilience Management Model. Independently Published, 2016.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Zuraw, Kie. Quantitative component interaction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198778264.003.0006.

Texte intégral
Résumé :
This chapter examines the phonological rule of nasal substitution in Tagalog, specifically its rate of application in different constructions. Nasal substitution can occur whenever a prefix that ends in /ŋ/ attaches to a stem beginning with an obstruent, as in /maŋ + bigáj/ → [mamigáj] ‘to distribute’. Different prefixes trigger nasal substitution at different rates. This is similar to cases in which word-internal syntactic structure determines how and whether a phonological rule applies (e.g. Newell and Piggott 2014), but different because none of these words’ syntactic structure absolutely prevents nasal substitution, such as by placing a phase boundary between the prefix and stem. The focus of the chapter is on laying out the data, but it does suggest three possible interpretations: variable syntactic structure, a phonology directly sensitive to prefix identity, or competition between productive syntactic structure and lexicalized pronunciation.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Jones, Craig. The War Lawyers. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198842927.001.0001.

Texte intégral
Résumé :
The War Lawyer s: The United States , Israel, and Juridical Warfare examines the laws of war as interpreted and applied by military lawyers to aerial targeting operations carried out by the US military in Iraq and Afghanistan, and the Israel Defense Force (IDF) in Gaza. Drawing on interviews with military lawyers and others, this book explains why some lawyers became integrated in the chain of command whereby military targets are identified and attacked, whether by manned aircraft, drones and/or ground forces, and with what results. The analysis shows how a series of political, legal, and technological developments have given rise to a targeting apparatus that requires legal input. In examining the effects of this process, the book argues that when lawyers render legal advice on targeting, they effectively put the indeterminacy of law in the service of producing and extending military violence, as well as constraining it. This is an iterative and ongoing law-making enterprise carried out in concert with the commanders whom lawyers advise. The provision of legal answers and options takes place in a highly routinized fashion under the overarching imperatives of mission success, and crucially, under pressures of time and emergent events in the battlespace. Military lawyers respond to intelligence data from widely distributed actors—but also inevitable gaps, errors, and misinterpretations in such data. The War Lawyers examines the mutual influence of US and Israeli targeting policies and shows just how important law and military lawyers have become in the conduct of contemporary warfare.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie