To see the other types of publications on this topic, follow the link: Digital attacks.

Books on the topic 'Digital attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Digital attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Su, Karen. Digital video watermarking principles for resistance to collusion and interpolation attacks. National Library of Canada, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, Mark W. (Mark William), 1955-, ed. Digital assassination: Protecting your reputation, brand, or business against online attacks. St. Martin's Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian
APA, Harvard, Vancouver, ISO, and other styles
4

Project, American Social History, and George Mason University. Center for History and New Media., eds. The September 11 digital archive: Saving the histories of September 11, 2001. s.n.], 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [publisher not identified], 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Honeker, Kenneth S. An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN). Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mark, Davis, and Richard Torrenzano. Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. St. Martin's Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thakkar, Dhanya. Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks. Packt Publishing - ebooks Account, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hybrid Media Events: The Charlie Hebdo Attacks and Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Department of Defense. Cyber Attacks, Attribution, and Deterrence: Case Studies - Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure As Vital to National Security. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez, and Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez, and Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hybrid Media Events: The Charlie Hebdo Attacks and the Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sumiala, Johanna, Katja Valaskivi, Minttu Tikka, and Jukka Huhtamäki. Hybrid Media Events: The Charlie Hebdo Attacks and the Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sumiala, Johanna, Katja Valaskivi, Minttu Tikka, and Jukka Huhtamäki. Hybrid Media Events: The Charlie Hebdo Attacks and the Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Amunategui, Manuel, and Lucas Amunategui. Defense Against the Dark Digital Attacks: How to Protect Your Identity and Workflow In 2019. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Difference in Magnitude: The World's First Nuclear Attacks as Chronicled by 1945 and 1946 Documents (Audiofy Digital Audiobook Chips). Audiofy/Sound Room, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Introduction to Bitcoin: Understanding Peer-To-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining, Network Attacks, Bitcoin Core Software, and Wallet Safety. Canada Self-Publishers, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bright, J. E. Andromon's Attack (Digimon Digital Monsters). Econo-Clad Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems a
APA, Harvard, Vancouver, ISO, and other styles
21

Sobieraj, Sarah. Credible Threat. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190089283.001.0001.

Full text
Abstract:
This book argues that the rampant hate-filled attacks against women online are best understood as patterned resistance to women’s political voice and visibility. This abuse and harassment coalesces into an often-unrecognized form of gender inequality that constrains women’s use of digital public spaces, much as the pervasive threat of sexual intimidation and violence constrain women’s freedom and comfort in physical public spaces. What’s more, the abuse exacerbates inequality among women, those from racial, ethnic, religious, and/or other minority groups, are disproportionately targeted. Drawi
APA, Harvard, Vancouver, ISO, and other styles
22

Bright, J. E. Digimon #03: Andromon's Attack (Digimon Digital Monsters). HarperEntertainment, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hacked, attacked & abused: Digital crime exposed. Kogan Page, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bright, J. E. Digimon Digital Monsters: Andromon's Attack Bk.3 (Digimon). Puffin Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Anderson, James A. The Near Future. Oxford University Press, 2018. http://dx.doi.org/10.1093/acprof:oso/9780199357789.003.0018.

Full text
Abstract:
Digital computing has transformed our civilization. Eventually, both computer professionals and regular users will interact with a computer as they would with another human of equivalent or greater intelligence but with a better grasp of fine detail. However, computer pathologies will increase with increasing power and ubiquity. Unintended consequences will occur from the intrinsic unreliability of hugely complex systems. The most sinister danger in the near future of computing is from humans: malware, hacking, theft, attacks. Modern lessons can be learned from the past history of computer att
APA, Harvard, Vancouver, ISO, and other styles
26

Sambaluk, Nicholas Michael. Myths and Realities of Cyber Warfare. ABC-CLIO, LLC, 2020. http://dx.doi.org/10.5040/9798400689178.

Full text
Abstract:
This illuminating book examines and refines the commonplace “wisdom” about cyber conflict? its effects, character, and implications for national and individual security in the 21st century. "Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle. The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber at
APA, Harvard, Vancouver, ISO, and other styles
27

Simon, Robert, ed. Il giornalismo sotto attacco. Nomos Verlagsgesellschaft mbH & Co. KG, 2019. http://dx.doi.org/10.5771/9783748904977.

Full text
Abstract:
Is journalism under threat? The image of journalists, as helmeted war correspondents protected by bullet-proof vests and armed only with cameras and microphones, springs to mind. Physical threats are only the most visible dangers, however. Journalists and journalism itself are facing other threats such as censorship, political and economic pressure, intimidation, job insecurity and attacks on the protection of journalists’ sources. Social media and digital photography mean that anyone can now publish information, which is also upsetting the ethics of journalism. How can these threats be tackle
APA, Harvard, Vancouver, ISO, and other styles
28

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital a
APA, Harvard, Vancouver, ISO, and other styles
29

Capitol Riots: Digital Media, Disinformation, and Democracy under Attack. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Digital Blood on Their Hands: The Ukraine Cyberwar Attack. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

ulthiin, iowyth hezel, Miranda McKee, Michael Hoechsmann, David VanDyke, and Sandra Jeppesen. Capitol Riots: Digital Media, Disinformation, and Democracy under Attack. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jenkinson, Andrew. Digital Blood on Their Hands: The Ukraine Cyberwar Attack. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Jenkinson, Andrew. Digital Blood on Their Hands: The Ukraine Cyberwar Attack. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

ulthiin, iowyth hezel, Miranda McKee, Michael Hoechsmann, David VanDyke, and Sandra Jeppesen. Capitol Riots: Digital Media, Disinformation, and Democracy under Attack. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Jenkinson, Andrew. Digital Blood on Their Hands: The Ukraine Cyberwar Attack. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Digital Blood on Their Hands: The Ukraine Cyberwar Attack. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Marion, Nancy E., and Jason Twede. Cybercrime. An Imprint of ABC-CLIO, LLC, 2020. http://dx.doi.org/10.5040/9798400636547.

Full text
Abstract:
This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the fu
APA, Harvard, Vancouver, ISO, and other styles
38

The Digital Umbrella: Technology's Attack On Personal Privacy In America. Brown Walker Press (FL), 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cyber attack: The truth about digital crime, cyber warfare and government snooping. Carlton Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Burnham, Karen. Writing Radical Hard SF. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038419.003.0002.

Full text
Abstract:
This chapter begins with an overview of Greg Egan's fiction. It centers his work in the context of the “radical hard SF” promoted by the magazine Interzone in the mid-to-late 1980s and provides an overview of his work to date, including his rise to prominence (and subsequent diminishment). It traces a loose “future history” that his stories follow, moving from biomedical advances in the near future to digital immortality in the far future. It also gives a summary of some of his reception by critics to date, including the focus on his perceived lack of characterization and the various attacks a
APA, Harvard, Vancouver, ISO, and other styles
41

Engeseth, Stefan. Sharkonomics: How to Attack and Defend Your Business in Today's Disruptive Digital Waters. Marshall Cavendish International (Asia) Private Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Information Warfare: Corporate attack and defence in a digital world (Computer Weekly Professional). Butterworth-Heinemann, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Greenland, Thomas H. Epilogue. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040115.003.0009.

Full text
Abstract:
This epilogue examines some of the changes that have taken place in the decade-plus since the author conducted his study in 2002, along with their impact on New York City's jazz scene. It begins with a discussion of the terrorist attacks of September 11, 2001; the housing bubble in 2007–2008 and the ensuing global financial crisis; and the continued gentrification of New York neighborhoods. It then considers how the economic recession affected jazz entrepreneurs and looks at the advent of file-sharing and music-streaming technologies as well as digital media such as Facebook, artist websites a
APA, Harvard, Vancouver, ISO, and other styles
44

Sambaluk, Nicholas Michael, ed. Conflict in the 21st Century. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798400630378.

Full text
Abstract:
This reference work examines how sophisticated cyber-attacks and innovative use of social media have changed conflict in the digital realm, while new military technologies such as drones and robotic weaponry continue to have an impact on modern warfare. Cyber warfare, social media, and the latest military weapons are transforming the character of modern conflicts. This book explains how, through overview essays written by an award-winning author of military history and technology topics; in addition to more than 200 entries dealing with specific examples of digital and physical technologies, c
APA, Harvard, Vancouver, ISO, and other styles
45

Powers, Shawn M., and Michael Jablonski. Geopolitics and the Internet. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039126.003.0001.

Full text
Abstract:
This book proposes a broader perspective of cyber war, conceptualized as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems as well as the myriad ways the Internet is used to further a state's economic and military agendas. In particular, it examines the historical genesis of the “internet freedom” movement and considers the political, economic, and geopolitical factors driving internet-freedom policies, such as the U.S. State Department's freedom-to-connect doctrine. The book argues that efforts to create a singul
APA, Harvard, Vancouver, ISO, and other styles
46

Selby, Nick, and Heather Vescent. Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse. Weldon Owen, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

author, Vescent Heather, Chow Eric illustrator, and Buckley Conor illustrator, eds. The cyber attack survival manual: Tools for surviving everything from identity theft to the digital apocalypse. Weldon Owen, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Knolls, Susan. Hack Attack - How to Protect Your Digital Assets from a Hacker : : A Beginner's Guide to Cybersecurity. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age. Springer Fachmedien Wiesbaden GmbH, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Schlie, Ulrich, ed. Modernes Regierungshandeln im Zeitalter der Globalisierung. Nomos Verlagsgesellschaft mbH & Co. KG, 2019. http://dx.doi.org/10.5771/9783845278537.

Full text
Abstract:
In our increasingly insecure world, governance is being confronted with new challenges every day. Rising nationalism, terrorist attacks, an increasing number of populist forms of governance, the egoism of governments, digital change, ‘warlordism’ and anarchy: this is an incomplete list of the problems modern governance is having to face. These problems have to be seen against the background of structural changes caused by the process of globalisation. Among others, they not only affect the fundamental relationship between individuals and society, but also that between the constitutional bodies
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!