Books on the topic 'Classification of Cyber- Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Classification of Cyber- Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Amoroso, Edward G. Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2012.
Find full textIglezakis, Ioannis. The legal regulation of cyber attacks. Kluwer Law International B. V., 2016.
Find full textBhardwaj, Akashdeep, and Varun Sapra, eds. Security Incidents & Response Against Cyber Attacks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5.
Full textAmoroso, Edward. Cyber Attacks: Protecting National Infrastructure. Elsevier Science & Technology Books, 2010.
Find full textStiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.
Find full textMiddleton, Bruce. History of Cyber Security Attacks. Taylor & Francis Group, 2020.
Find full textMishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.
Find full textMishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.
Find full textHarmon, Daniel E. Cyber Attacks, Counterattacks, and Espionage. Rosen Publishing Group, 2016.
Find full textCyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2000.
Find full textMauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.
Full textMiddleton, Bruce. A History of Cyber Security Attacks. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315155852.
Full textBritain, Great. Cyber-Attacks (Asset-Freezing) Regulations 2019. Stationery Office, The, 2019.
Find full textAlghamdi, Abdulrahman. Understanding the Evolution of Cyber Attacks. Lulu Press, Inc., 2023.
Find full textFerrari, John H. Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare. Independently Published, 2016.
Find full textEversole, Roberto. Cyber Warfare Prep : Everything You Should Know: Cyber Attacks Statistics. Independently Published, 2021.
Find full textMunk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.
Find full textMunk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Routledge, 2022.
Find full textMunk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.
Find full textMunk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.
Find full textTargeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware. Elsevier Science, 2014.
Find full textGonzalea, Therese. Cyber Warfare Attacks 101 : Truth, Tactics, and Strategies in Cyber Warfare: How Does the U S Defend Against Cyber Attacks. Independently Published, 2021.
Find full textUlsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.
Find full textUlsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.
Find full textCongress, United Stat, Committee on Foreign Affairs, and United States House of Representatives. Communist Chinese Cyber-Attacks, Cyber-espionage, and Theft of American Technology. Independently Published, 2019.
Find full textUlsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.
Find full textCyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Limited, John, 2014.
Find full textSood, Aditya, and Richard Enbody. Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware. Elsevier Science & Technology Books, 2014.
Find full text1st, Saxena Ashendra Kumar. Enhanced Resilience Against Cyber Attacks and Vulnerabilities. Alexis Press LLC, 2022.
Find full textBhardwaj, Akashdeep, and Varun Sapra. Security Incidents and Response Against Cyber Attacks. Springer International Publishing AG, 2021.
Find full textAmoroso, Edward. Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. Elsevier Science & Technology Books, 2012.
Find full textBhardwaj, Akashdeep, and Varun Sapra. Security Incidents and Response Against Cyber Attacks. Springer International Publishing AG, 2022.
Find full textLoukas, George. Cyber-Physical Attacks: A Growing Invisible Threat. Elsevier Science & Technology Books, 2015.
Find full textUdofot, Michael. Preventing Cyber-Attacks: Solutions for Small Businesses. Independently Published, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.
Find full text