Books on the topic 'Ddos'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Ddos.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1946-, Jenkins Geraint H., ed. Cymru, ddoe a heddiw. Gwasg Prifysgol Rhydychen, 1992.
Find full textCymru, Cymdeithas Cerdd Dant, ed. Ceinciau ddoe a heddiw. Cymdeithas Cerdd Dant Cymru, 1997.
Find full textMyfanwy, Morris, Lloyd Lewis 1939-, and Gwynedd Archives and Museums Service., eds. Porthmadog: Llanw ddoe = yesterday's tide. Gwasanaeth Archifau ac Amgueddfeydd Gwynedd, 1991.
Find full textGroup, Gale, and Primary Source Media (Firm), eds. Declassified documents reference system: DDRS. Thomson Gale, 1998.
Find full textRobinson, Kenneth Wyn. Gorsafoedd yng Ngwynedd: Ddoe a heddiw. Cyhoeddiadau Mei, 1987.
Find full textNational Institute for Occupational Safety and Health, ed. D. Kurtzman, DDS, Atlanta, Georgia. U.S. Dept. of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, 1994.
Find full textJanssen, Daniël, and Rob Neutelings, eds. Reading and Writing Public Documents. John Benjamins Publishing Company, 2001. http://dx.doi.org/10.1075/ddcs.1.
Full textCarliner, Saul, Jan Piet Verckens, and Cathy de Waele, eds. Information and Document Design. John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ddcs.7.
Full textNational Institute for Occupational Safety and Health., ed. Hodges and King, DDS, Atlanta, Georgia. U.S. Dept. of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health, 1994.
Find full textHughes, T. Meirion. Caernarfon ddoe: Y Colera a'r gronfa dd^wr newydd. T. Meirion Hughes, 1996.
Find full textCoolbaugh, James. DDS programming for display and printer files. 2nd ed. 29th Street Press, 1999.
Find full textMilanova, Mladenka. Zakon za danŭk vŭrkhu dobavenata stoĭnost (DDS): Komentar. Pŭrva danŭchna kŭshta, 1993.
Find full textTokai, Industries Inc. English in America: Dinner at DD's cafe : [Yu xue Mei yü]. Tokai Industries, 1998.
Find full textUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. Acquisition plan for digital document storage (DDS) prototype system. NASA STI Program, 1990.
Find full textVolunteers, United Nations. Monographs on UNV DDS field workers: Indonesia, Nepal, Sri Lanka. United Nations, 1986.
Find full textCommission, Legal Services, ed. Cyfeiriadur gwasanaeth cyfreithiol: Sut i ddod o hyd i gymorth a gwybodaeth gyfreithiol. Comisiwn Gwasanaethau Cyfreithiol, 2000.
Find full textBhattacharyya, Dhruba Kumar. DDoS Attacks. Chapman and Hall/CRC, 2016. http://dx.doi.org/10.1201/b20614.
Full textGupta, Brij B., and Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.
Full textBhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Find full textBhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Find full textDDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Find full textTheoretical and Experimental Methods for Defending Against DDOS Attacks. Elsevier, 2016. http://dx.doi.org/10.1016/c2015-0-05397-7.
Full textAmiri, Iraj Sadegh, and Mohammad Reza K. Soltanian. Theoretical and Experimental Methods for Defending Against DDOS Attacks. Elsevier Science & Technology Books, 2015.
Find full textAmiri, Iraj Sadegh, and Mohammad Reza K. Soltanian. Theoretical and Experimental Methods for Defending Against DDOS Attacks. Elsevier Science & Technology Books, 2015.
Find full textThakkar, Dhanya. Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks. Packt Publishing - ebooks Account, 2017.
Find full textThe coming swarm: DDoS actions, hacktivism, and civil disobedience on the Internet. Bloomsbury Academic, an imprint of Bloomsburg Publishing Inc., 2014.
Find full text