To see the other types of publications on this topic, follow the link: Classification of Cyber- Attacks.

Books on the topic 'Classification of Cyber- Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Classification of Cyber- Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Amoroso, Edward G. Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iglezakis, Ioannis. The legal regulation of cyber attacks. Kluwer Law International B. V., 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhardwaj, Akashdeep, and Varun Sapra, eds. Security Incidents & Response Against Cyber Attacks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cyber Attacks. Elsevier, 2011. http://dx.doi.org/10.1016/c2010-0-64972-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Targeted Cyber Attacks. Elsevier, 2014. http://dx.doi.org/10.1016/c2013-0-14275-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cyber-Physical Attacks. Elsevier, 2015. http://dx.doi.org/10.1016/c2013-0-19393-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amoroso, Edward. Cyber Attacks: Protecting National Infrastructure. Elsevier Science & Technology Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyber Defense: Countering Targeted Attacks. Government Institutes, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cyber Attacks, Counterattacks, and Espionage. Rosen Publishing Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Middleton, Bruce. History of Cyber Security Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Harmon, Daniel E. Cyber Attacks, Counterattacks, and Espionage. Rosen Publishing Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.

Full text
Abstract:
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, t
APA, Harvard, Vancouver, ISO, and other styles
18

Middleton, Bruce. A History of Cyber Security Attacks. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315155852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rise of Politically Motivated Cyber Attacks. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Britain, Great. Cyber-Attacks (Asset-Freezing) Regulations 2019. Stationery Office, The, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hacked: The Secrets Behind Cyber Attacks. Kogan Page, Limited, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hacked: The Secrets Behind Cyber Attacks. Kogan Page, Limited, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Alghamdi, Abdulrahman. Understanding the Evolution of Cyber Attacks. Lulu Press, Inc., 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hacked: The Secrets Behind Cyber Attacks. Kogan Page, Limited, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ferrari, John H. Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare. Independently Published, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Eversole, Roberto. Cyber Warfare Prep : Everything You Should Know: Cyber Attacks Statistics. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Munk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Munk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Routledge, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Munk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Munk, Tine. Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Targeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware. Elsevier Science, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gonzalea, Therese. Cyber Warfare Attacks 101 : Truth, Tactics, and Strategies in Cyber Warfare: How Does the U S Defend Against Cyber Attacks. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ulsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ulsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Congress, United Stat, Committee on Foreign Affairs, and United States House of Representatives. Communist Chinese Cyber-Attacks, Cyber-espionage, and Theft of American Technology. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ulsch, MacDonnell. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cyber threat!: How to manage the growing risk of cyber attacks. Wiley, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley & Sons, Limited, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sood, Aditya, and Richard Enbody. Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

1st, Saxena Ashendra Kumar. Enhanced Resilience Against Cyber Attacks and Vulnerabilities. Alexis Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Information warfare: How to survive cyber attacks. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bhardwaj, Akashdeep, and Varun Sapra. Security Incidents and Response Against Cyber Attacks. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Amoroso, Edward. Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. Elsevier Science & Technology Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bhardwaj, Akashdeep, and Varun Sapra. Security Incidents and Response Against Cyber Attacks. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Loukas, George. Cyber-Physical Attacks: A Growing Invisible Threat. Elsevier Science & Technology Books, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Udofot, Michael. Preventing Cyber-Attacks: Solutions for Small Businesses. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

SMALL BUSINESSES – A HACKER’S PLAYGROUND. jason rorie, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!