Livros sobre o tema "Security attacks detection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 32 melhores livros para estudos sobre o assunto "Security attacks detection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Encontre o texto completo da fonteRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Encontre o texto completo da fonteNelson A. Rockefeller Institute of Government., ed. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Encontre o texto completo da fonteBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts.: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington: U.S. G.P.O., 2005.
Encontre o texto completo da fonteAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling: Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington: U.S. G.P.O., 2007.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington: U.S. G.P.O., 2007.
Encontre o texto completo da fonteAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials: How effective is available technology? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington: U.S. G.P.O., 2007.
Encontre o texto completo da fonteBhattacharyya, Dhruba Kumar, e Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteBhattacharyya, Dhruba Kumar, e Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteRaghavan, S. V., e E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Encontre o texto completo da fonteRaghavan, S. V., e E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Encontre o texto completo da fonteSaxe, Joshua, e Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Encontre o texto completo da fonteRash, Michael. Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, 2007.
Encontre o texto completo da fonteSpringer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.
Texto completo da fonteSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Encontre o texto completo da fonteFalco, Gregory J., e Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Texto completo da fonteAmishav-Zlatin, Josh, OWASP Foundation Staff, John Melton, Dennis Groves e Colin Watson. AppSensor Guide : Application-Specific Real Time Attack Detection and Response: Version 2.0. Lulu Press, Inc., 2014.
Encontre o texto completo da fonteBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Encontre o texto completo da fonteSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Encontre o texto completo da fonteSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Taylor & Francis Group, 2017.
Encontre o texto completo da fonteSkopik, Florian. Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level. Auerbach Publishers, Incorporated, 2017.
Encontre o texto completo da fonteBrancik, Kenneth. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Encontre o texto completo da fonteBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Encontre o texto completo da fonteBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Encontre o texto completo da fonteParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Encontre o texto completo da fonteDhs Coordination of Nuclear Detection Efforts: Hearing Before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Home. Not Avail, 2005.
Encontre o texto completo da fonteStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2022.
Encontre o texto completo da fonteStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Encontre o texto completo da fonteStamps, Stephen. Future Attack : Protect the Past: Defend the Present & Preserve the Future in the Name of Global and National Security Interest. PageTurner: Press & Media, 2021.
Encontre o texto completo da fonte