Livros sobre o tema "Cyber defensive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Cyber defensive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.
Texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.
Texto completo da fonteKott, Alexander, Cliff Wang e Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.
Texto completo da fonteKott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.
Texto completo da fonteJajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang e Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Texto completo da fonteVijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy e Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.
Texto completo da fonteRani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi e Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.
Texto completo da fonte1958-, Nemati Hamid R., e Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteBelk, Robert. On the use of offensive cyber capabilities: A policy analysis for the Department of Defense Office of Cyber Policy. Cambridge, Mass: John F. Kennedy School of Government, 2012.
Encontre o texto completo da fonteMoore, Alexis. Cyber self-defense: Expert advice to avoid online predators, identity theft, and cyberbullying. Guilford, Connecticut: Lyons Press, 2014.
Encontre o texto completo da fonteAlmomani, Iman, e Nick Ayres. Cyber Malware: Offensive and Defensive Systems. Springer International Publishing AG, 2023.
Encontre o texto completo da fonteKello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.
Texto completo da fonteThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.
Encontre o texto completo da fontePavisic, Ivica, Anthony Lawrence, Chaitra M. Hardison, Leslie Adrienne Payne e Julia Whitaker. Building the Best Offensive and Defensive Cyber Workforce: Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, The, 2021.
Encontre o texto completo da fonteGoldsmith, Jack, ed. The United States' Defend Forward Cyber Strategy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197601792.001.0001.
Texto completo da fontePavisic, Ivica, Chaitra M. Hardison, Danielle Bean, Julia Whitaker e Jenna W. Kramer. Building the Best Offensive and Defensive Cyber Workforce: Improving U. S. Air Force Training and Development. RAND Corporation, The, 2021.
Encontre o texto completo da fonteBuchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.
Texto completo da fonteBuilding the Best Offensive and Defensive Cyber Workforce: Volume I, Improving U.S. Air Force Training and Development. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-1.
Texto completo da fonteBuilding the Best Offensive and Defensive Cyber Workforce: Volume II, Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-2.
Texto completo da fonteValeriano, Brandon. The United States. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0007.
Texto completo da fonteBuchanan, Ben. The Cybersecurity Dilemma. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.001.0001.
Texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.
Encontre o texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.
Encontre o texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.
Encontre o texto completo da fonteBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Texto completo da fonteM, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.
Encontre o texto completo da fonteYang, Lin, e Quan Yu. Dynamically-Enabled Cyber Defense. World Scientific Publishing Co Pte Ltd, 2021.
Encontre o texto completo da fonteM, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.
Encontre o texto completo da fonteM, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.
Encontre o texto completo da fonteGiles, Keir, Strategic Studies Institute e Kim Hartmann. Cyber Defense: An International View. Lulu Press, Inc., 2015.
Encontre o texto completo da fonteKott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2016.
Encontre o texto completo da fonteKott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.
Encontre o texto completo da fonteStiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.
Encontre o texto completo da fonteCyber Reconnaissance, Surveillance and Defense. Elsevier, 2015. http://dx.doi.org/10.1016/c2013-0-13412-5.
Texto completo da fonteCyber Defense: Countering Targeted Attacks. Government Institutes, 2011.
Encontre o texto completo da fonteCartwright, Adam. Ransomware: Threat Centric Cyber Defense. Independently Published, 2022.
Encontre o texto completo da fonteKott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.
Encontre o texto completo da fonteShimonski, Robert. Cyber Reconnaissance, Surveillance and Defense. Elsevier Science & Technology Books, 2014.
Encontre o texto completo da fonteGiles, Keir, . Strategic Studies Institute (U.S.), Douglas C. Lovelace Jr, Kim Hartmann e . Army War College (U.S.). Cyber Defense: An International View. Department of the Army, 2016.
Encontre o texto completo da fonteGiles, Keir, Strategic Studies Institute e Kim Hartmann. Cyber Defense: An International View. Independently Published, 2015.
Encontre o texto completo da fonteCyber Defense and Situational Awareness. Springer, 2015.
Encontre o texto completo da fonteCyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2000.
Encontre o texto completo da fonteCyber Reconnaissance, Surveillance and Defense. Syngress, 2014.
Encontre o texto completo da fonteAmoroso, Edward. Cyber Security. Silicon Press, 2006.
Encontre o texto completo da fonteGheorghe, A. V., U. Tatar e Y. Gokce. Strategic Cyber Defense: A Multidisciplinary Perspective. IOS Press, Incorporated, 2017.
Encontre o texto completo da fonteNewman, Maxine. U. S. Cyber Strategies. Nova Science Publishers, Incorporated, 2016.
Encontre o texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer London, Limited, 2014.
Encontre o texto completo da fonteCarayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2016.
Encontre o texto completo da fonteCyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2014.
Encontre o texto completo da fonteBronk, Chris. Cyber Threat. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636455.
Texto completo da fonte