Livres sur le sujet « Security attacks detection »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 32 meilleurs livres pour votre recherche sur le sujet « Security attacks detection ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les livres sur diverses disciplines et organisez correctement votre bibliographie.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen : Shaker, 2005.
Trouver le texte intégralRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks : Critical Information Infrastructure Protection. India : Springer India Pvt. Ltd., 2011.
Trouver le texte intégralNelson A. Rockefeller Institute of Government., dir. The role of "home" in homeland security : The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y : The Institute, 2003.
Trouver le texte intégralBrancik, Kenneth C. Insider computer fraud : An indepth framework for detecting and defending against insider it attacks. Boca Raton : Auerbach Publications, 2007.
Trouver le texte intégralUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution : Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington : U.S. G.P.O., 2010.
Trouver le texte intégralUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts. : Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington : U.S. G.P.O., 2005.
Trouver le texte intégralAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling : Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention : Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials : How effective is available technology ? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralBhattacharyya, Dhruba Kumar, et Jugal Kumar Kalita. DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Trouver le texte intégralBhattacharyya, Dhruba Kumar, et Jugal Kumar Kalita. DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Trouver le texte intégralRaghavan, S. V., et E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks : Critical Information Infrastructure Protection. Springer, 2011.
Trouver le texte intégralRaghavan, S. V., et E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks : Critical Information Infrastructure Protection. Springer, 2013.
Trouver le texte intégralSaxe, Joshua, et Hillary Sanders. Malware Data Science : Attack Detection and Attribution. No Starch Press, 2018.
Trouver le texte intégralRash, Michael. Linux Firewalls : Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, 2007.
Trouver le texte intégralSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Texte intégralSkopik, Florian. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Trouver le texte intégralFalco, Gregory J., et Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Texte intégralAmishav-Zlatin, Josh, OWASP Foundation Staff, John Melton, Dennis Groves et Colin Watson. AppSensor Guide : Application-Specific Real Time Attack Detection and Response : Version 2.0. Lulu Press, Inc., 2014.
Trouver le texte intégralBrancik, Kenneth. Insider Computer Fraud : An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Trouver le texte intégralSkopik, Florian. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Trouver le texte intégralSkopik, Florian. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Trouver le texte intégralSkopik, Florian. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level. Taylor & Francis Group, 2017.
Trouver le texte intégralSkopik, Florian. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Trouver le texte intégralBrancik, Kenneth. Insider Computer Fraud : An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Trouver le texte intégralBrancik, Kenneth. Insider Computer Fraud : An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Trouver le texte intégralBrancik, Kenneth. Insider Computer Fraud : An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Trouver le texte intégralParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity : Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Trouver le texte intégralDhs Coordination of Nuclear Detection Efforts : Hearing Before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Home. Not Avail, 2005.
Trouver le texte intégralStamps, Stephen. Future Attack : Protect the Past : Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner : Press & Media, 2022.
Trouver le texte intégralStamps, Stephen. Future Attack : Protect the Past : Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner : Press & Media, 2021.
Trouver le texte intégralStamps, Stephen. Future Attack : Protect the Past : Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner : Press & Media, 2021.
Trouver le texte intégral