Books on the topic 'Attack mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 41 books for your research on the topic 'Attack mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Dzikansky, Mordecai Z. Terrorist suicide bombings: Attack interdiction, mitigation, and response. CRC Press, 2012.
Find full textDübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.
Find full textHersman, Rebecca K. C. DOD and consequence management: Mitigating the effects of chemical and biological attack. Institute for National Strategic Studies, National Defense University, 1999.
Find full textRaghavan, S. V., and E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
Full textCasola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Full textE, Dawson, and SpringerLink (Online service), eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer India Pvt. Ltd., 2011.
Find full textAugustyn, Teresa. An evaluation of grizzly bear - human conflict in the northwest boreal region of Alberta (1991 to 2000) and potential mitigation. Fisheries & Wildlife Management Division, Resource Status and Assessment Branch, 2001.
Find full textAltvater, Elmar. Ablasshandel gegen Klimawandel?: Marktbasierte Instrumente in der globalen Klimapolitik und ihre Alternativen : Reader des Wissenschaftlichen Beirats von Attac. VSA-Verlag, 2008.
Find full textAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Mitigating catastrophic events through effective medical response: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, October 20, 2005. U.S. G.P.O., 2007.
Find full textRobert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.
Find full textRobert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.
Find full textRobert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2013.
Find full textRobert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.
Find full textAMULYA, A. Cyber Security for Smart Grid Control: Vulnerability Assessment, Attack Detection and Mitigation. Springer, 2024.
Find full textSchneider, Maryanne. Vulnerabilities of the U. S. to an Electromagnetic Pulse Attack: Threat Assessments and Mitigation Recommendations. Nova Science Publishers, Incorporated, 2016.
Find full textZeigler, Sean, Alexander Hou, Jeffrey Martini, et al. Acquisition and Use of MANPADS Against Commercial Aviation: Risks, Proliferation, Mitigation, and Cost of an Attack. RAND Corporation, 2019. http://dx.doi.org/10.7249/rr4304.
Full textPhillips, Brian, Jeffrey Martini, Alexander C. Hou, Sean M. Zeigler, and Daniel M. Norton. Acquisition and Use of MANPADS Against Commercial Aviation: Risks, Proliferation, Mitigation, and Cost of an Attack. RAND Corporation, The, 2020.
Find full textDepartment of Defense. Federal Response to a Domestic Nuclear Attack - Topics Include Mitigation, Nuclear Bomb Effect, Hypothetical Cases, Shelter Decision, Message, Transportation Dilemma, Posse Comitatus, and Stafford Act. Independently Published, 2018.
Find full textTeckchandani, Tanmay. SQL Injection Attacks and Mitigations. GRIN Verlag GmbH, 2019.
Find full textChegenizadeh, Amin, and Mahdi Keramatikerman. Mitigating Sulphate Attacks in Geotechnical Engineering. Nova Science Publishers, Incorporated, 2017.
Find full textChapman, Blake. Shark Attacks. CSIRO Publishing, 2017. http://dx.doi.org/10.1071/9781486307364.
Full textBrooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Find full textBrooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Find full textBrooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Find full textBrooks, Richard, and İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Find full textBrooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Find full textCatak, Ferhat Ozgur. Cyber Security and Adversarial Machine Learning: Emerging Attacks and Mitigation Strategies. IGI Global, 2021.
Find full textGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Find full textGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Find full textIdentifying Denial of Service Attacks and Appropriate Mitigation Strategies for Small to Medium Sized Enterprises. GRIN Verlag GmbH, 2014.
Find full textA Method for Mitigating Denial of Service Attacks on Differentiated Services Networks. Storming Media, 2002.
Find full textPhishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. Apress L. P., 2021.
Find full textRaghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Find full textRaghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Find full textComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full textDepartment of Defense. Cyber Security for Critical Energy Infrastructure - Enhancing Electrical Grid Security, Attacks on Ukrainian and Western Energy Sectors, Critical Infrastructure Management, Safeguards, Mitigation. Independently Published, 2018.
Find full textSecurity Systems for Mitigating Attacks from a Headless Browser Executing on a Client Computer: United States Patent 9986058. Independently Published, 2020.
Find full textCornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.
Full text