To see the other types of publications on this topic, follow the link: Computer attack.

Books on the topic 'Computer attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Richard, Mansfield. Hacker attack. San Francisco, Calif: SYBEX, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

College), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Briggs, Andy. Virus attack. New York: Walker Books for Young Readers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

E, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mesley, Wendy. Can you hack it?: The attack on personal information. Princeton, NJ: Films for the Humanities & Sciences, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stevens, Cara J. Redstone Junior High: When Endermen attack. New York: Sky Pony, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

M, Goodman Roy, ed. Beware computer "virus attack": A staff report on the lack of security in state owned and operated computers. Albany, N.Y: The Committee, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tracey, West. Attack of the prehistoric Pokémon. New York: Scholastic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tracey, West. Attack of the prehistoric Pokémon. New York: Scholastic, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

ill, Altmann Scott, ed. Hack attack: A trip to Wonderland. Minneapolis, Minn: Magic Wagon, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Basham, Tom. Werewolf vs. Comanche: The official strategy guide. [Rocklin, CA]: Prima Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

CodeBoy, ed. Prima's authorized GameShark pocket power guide: Attack of the 50 foot CodeBoy. Roseville, CA: Prima Games, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Karppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. [Espoo, Finland]: VTT Technical Research Centre of Finland, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

United, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrrorism and Government Information. "Cyber attack: Improving prevention and prosecution" : hearing before ... 106th Congress, 2nd session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. Washington, DC: U.S G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Reese, Andrew. Apache: Strategies & secrets. San Francisco: Sybex, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Frase, Tuesday. The official guide to Jane's Longbow 2. Edited by Ladyman David. Austin, TX: Origin system, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Goldstein, Margaret J., and Martin Gitlin. Cyber Attack. Lerner Publishing Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Stuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Stuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Stuttard, Dafydd, Marcus Pinto, Michael Hale Ligh, Steven Adair, and Blake Hartstein. Attack and Defend Computer Security Set. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhou, Wanlei, Yang Xiang, Bo Liu, Sheng Wen, Shui Yu, and Jiaojiao Jiang. Malicious Attack Propagation and Source Identification. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Staff, EC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Rooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Raintree Publishers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Rooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Capstone, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Raintree Publishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rooney, Anne. Computer Science and IT: Investigating a Cyber Attack. Capstone, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Computer Science And It Investigating A Cyber Attack. Capstone Global Library Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mansfield, Richard. Hacker Attack!: Shield Your Computer from Internet Crime. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yang, Qing. Inside radio: An attack and defense guide. 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yang, Qing. Inside Radio: An Attack and Defense Guide. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

EC-Council. Ethical Hacking and Countermeasures: Attack Phases. Course Technology, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Morgan, Winter. The nether attack. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ballmann, Bastian. Understanding Network Hacks: Attack and Defense with Python. Springer Berlin / Heidelberg, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ballmann, Bastian. Understanding Network Hacks: Attack and Defense with Python. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Haber, Morey J., and Brad Hibbert. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Stolfo, Salvatore J., Angelos D. Keromytis, Steven M. Bellovin, Shlomo Hershkop, Sara Sinclair, and Sean W. Smith. Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

An Analysis of the Computer and Network Attack Taxonomy. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Ballmann, Bastian. Understanding Network Hacks: Attack and Defense with Python 3. Springer Berlin / Heidelberg, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ballmann, Bastian. Understanding Network Hacks: Attack and Defense with Python 3. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Nicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography