To see the other types of publications on this topic, follow the link: Attack mitigation.

Books on the topic 'Attack mitigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 41 books for your research on the topic 'Attack mitigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Dzikansky, Mordecai Z. Terrorist suicide bombings: Attack interdiction, mitigation, and response. CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hersman, Rebecca K. C. DOD and consequence management: Mitigating the effects of chemical and biological attack. Institute for National Strategic Studies, National Defense University, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raghavan, S. V., and E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Casola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. National Academies Press, 2019. http://dx.doi.org/10.17226/25534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

E, Dawson, and SpringerLink (Online service), eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer India Pvt. Ltd., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Augustyn, Teresa. An evaluation of grizzly bear - human conflict in the northwest boreal region of Alberta (1991 to 2000) and potential mitigation. Fisheries & Wildlife Management Division, Resource Status and Assessment Branch, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Altvater, Elmar. Ablasshandel gegen Klimawandel?: Marktbasierte Instrumente in der globalen Klimapolitik und ihre Alternativen : Reader des Wissenschaftlichen Beirats von Attac. VSA-Verlag, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Attack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Mitigating catastrophic events through effective medical response: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, October 20, 2005. U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Robert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Robert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Robert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Robert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

AMULYA, A. Cyber Security for Smart Grid Control: Vulnerability Assessment, Attack Detection and Mitigation. Springer, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Schneider, Maryanne. Vulnerabilities of the U. S. to an Electromagnetic Pulse Attack: Threat Assessments and Mitigation Recommendations. Nova Science Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Zeigler, Sean, Alexander Hou, Jeffrey Martini, et al. Acquisition and Use of MANPADS Against Commercial Aviation: Risks, Proliferation, Mitigation, and Cost of an Attack. RAND Corporation, 2019. http://dx.doi.org/10.7249/rr4304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Phillips, Brian, Jeffrey Martini, Alexander C. Hou, Sean M. Zeigler, and Daniel M. Norton. Acquisition and Use of MANPADS Against Commercial Aviation: Risks, Proliferation, Mitigation, and Cost of an Attack. RAND Corporation, The, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Department of Defense. Federal Response to a Domestic Nuclear Attack - Topics Include Mitigation, Nuclear Bomb Effect, Hypothetical Cases, Shelter Decision, Message, Transportation Dilemma, Posse Comitatus, and Stafford Act. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Teckchandani, Tanmay. SQL Injection Attacks and Mitigations. GRIN Verlag GmbH, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chegenizadeh, Amin, and Mahdi Keramatikerman. Mitigating Sulphate Attacks in Geotechnical Engineering. Nova Science Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chapman, Blake. Shark Attacks. CSIRO Publishing, 2017. http://dx.doi.org/10.1071/9781486307364.

Full text
Abstract:
Humans spend more time in or on the water than ever before. We love the beach. But for many people, getting in the water provokes a moment’s hesitation. Shark attacks are big news events and although the risk of shark attack on humans is incredibly low, the fact remains that human lives are lost to sharks every year.
 Shark Attacks explores the tension between risk to humans and the need to conserve sharks and protect the important ecological roles they play in our marine environments. Marine biologist Blake Chapman presents scientific information about shark biology, movement patterns an
APA, Harvard, Vancouver, ISO, and other styles
22

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Brooks, Richard, and İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Catak, Ferhat Ozgur. Cyber Security and Adversarial Machine Learning: Emerging Attacks and Mitigation Strategies. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Identifying Denial of Service Attacks and Appropriate Mitigation Strategies for Small to Medium Sized Enterprises. GRIN Verlag GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

A Method for Mitigating Denial of Service Attacks on Differentiated Services Networks. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. Apress L. P., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Raghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Raghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

National Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital a
APA, Harvard, Vancouver, ISO, and other styles
39

Department of Defense. Cyber Security for Critical Energy Infrastructure - Enhancing Electrical Grid Security, Attacks on Ukrainian and Western Energy Sectors, Critical Infrastructure Management, Safeguards, Mitigation. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Security Systems for Mitigating Attacks from a Headless Browser Executing on a Client Computer: United States Patent 9986058. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.

Full text
Abstract:
As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!