Books on the topic 'Computer attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Find full textCollege), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.
Find full textE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.
Find full textRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Find full textMesley, Wendy. Can you hack it?: The attack on personal information. Princeton, NJ: Films for the Humanities & Sciences, 2007.
Find full textCobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Find full textJelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.
Find full textStevens, Cara J. Redstone Junior High: When Endermen attack. New York: Sky Pony, 2018.
Find full textM, Goodman Roy, ed. Beware computer "virus attack": A staff report on the lack of security in state owned and operated computers. Albany, N.Y: The Committee, 1989.
Find full textill, Altmann Scott, ed. Hack attack: A trip to Wonderland. Minneapolis, Minn: Magic Wagon, 2013.
Find full textBasham, Tom. Werewolf vs. Comanche: The official strategy guide. [Rocklin, CA]: Prima Pub., 1996.
Find full textCodeBoy, ed. Prima's authorized GameShark pocket power guide: Attack of the 50 foot CodeBoy. Roseville, CA: Prima Games, 2002.
Find full textKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. [Espoo, Finland]: VTT Technical Research Centre of Finland, 2005.
Find full textUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrrorism and Government Information. "Cyber attack: Improving prevention and prosecution" : hearing before ... 106th Congress, 2nd session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. Washington, DC: U.S G.P.O., 2001.
Find full textFrase, Tuesday. The official guide to Jane's Longbow 2. Edited by Ladyman David. Austin, TX: Origin system, 1997.
Find full textGoldstein, Margaret J., and Martin Gitlin. Cyber Attack. Lerner Publishing Group, 2015.
Find full textStuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.
Find full textStuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.
Find full textStuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.
Find full textZhou, Wanlei, Yang Xiang, Bo Liu, Sheng Wen, Shui Yu, and Jiaojiao Jiang. Malicious Attack Propagation and Source Identification. Springer, 2018.
Find full textSaxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Find full textStaff, EC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2009.
Find full textRooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Raintree Publishers, 2013.
Find full textRooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Capstone, 2013.
Find full textRooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Raintree Publishers, 2014.
Find full textRooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Capstone, 2013.
Find full textComputer Science And It Investigating A Cyber Attack. Capstone Global Library Ltd, 2013.
Find full textMansfield, Richard. Hacker Attack!: Shield Your Computer from Internet Crime. Wiley & Sons, Incorporated, John, 2006.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer, 2018.
Find full textEC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2016.
Find full textBedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.
Find full textBedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.
Find full textBallmann, Bastian. Understanding Network Hacks: Attack and Defense with Python. Springer Berlin / Heidelberg, 2016.
Find full textBallmann, Bastian. Understanding Network Hacks: Attack and Defense with Python. Springer, 2015.
Find full textHaber, Morey J., and Brad Hibbert. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2017.
Find full textStolfo, Salvatore J., Angelos D. Keromytis, Steven M. Bellovin, Shlomo Hershkop, Sara Sinclair, and Sean W. Smith. Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2010.
Find full textYu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.
Find full textBallmann, Bastian. Understanding Network Hacks: Attack and Defense with Python 3. Springer Berlin / Heidelberg, 2022.
Find full textBallmann, Bastian. Understanding Network Hacks: Attack and Defense with Python 3. Springer Berlin / Heidelberg, 2021.
Find full textHandbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, 2019.
Find full textNicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, 2019.
Find full text