Books on the topic 'Insider attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Insider attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Stolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.
Full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.
Full textStorad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.
Find full textBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.
Find full textM, Goldstein Donald, and Dillon Katherine V, eds. The Pearl Harbor papers: Inside the Japanese plans. Brasseyʼs (US), 1993.
Find full textBeecroft, Simon. Inside the worlds of Star wars, attack of the clones. DK Pub., 2003.
Find full textKessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.
Find full textKessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.
Find full textSchreyer, Paul. Inside 9/11: Neue Fakten und Hintergründe zehn Jahre danach. Kai Homilius Verlag, 2011.
Find full textJim, Dwyer. 102 minutes: The untold story of the fight to survive inside the Twin Towers. Times Books, 2004.
Find full textLioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.
Find full textHerrera, Juan Felipe. Cinnamon girl: Letters found inside a cereal box. Joanna Cotler books, 2005.
Find full textBowen, Mark. Censoring science: Inside the political attack on Dr. James Hansen and the truth of global warming. Dutton, 2008.
Find full textLioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.
Find full textJosh, Meyer, ed. The hunt for KSM: Inside the pursuit and takedown of the real 9/11 mastermind, Khalid Sheikh Mohammed. Little, Brown and Co., 2012.
Find full textStolfo, Salvatore J., Angelos D. Keromytis, Steven M. Bellovin, Shlomo Hershkop, Sara Sinclair, and Sean W. Smith. Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2010.
Find full textInside Chess Opening Novelties: KID Bayonet Attack. International Chess Enterprises, 1996.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer, 2018.
Find full textGuitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.
Full textGoldstein, Donald M. The Pearl Harbor Papers: Inside the Japanese Plans. Potomac Books, 1993.
Find full textGoldstein, Donald M. The Pearl Harbor Papers: Inside the Japanese Plans. Potomac Books, 1993.
Find full textBrand, Russell. Attack of the Tiger Teams: Inside America's Computer Security Crisis. Microsoft Press, 1990.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Find full textInsider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Find full textAttack on Titan Coloring Book: Epic Gift for All Attack on Titan Fans with High-Quality Illustrations Inside. Independently Published, 2021.
Find full textWhat WE Lost: Inside the Attack on Canada's Largest Children's Charity. Optimum Publishing International, Incorporated, 2021.
Find full textTerrorist Watch: Inside the Desperate Race to Stop the Next Attack. Crown Publishing Group, The, 2008.
Find full textWhat WE Lost: Inside the Attack on Canada's Largest Children's Charity. Optimum Publishing International, Incorporated, 2021.
Find full textWARD, D. Mae, and T. H. E. FLOWER. Werewolves Attacks the Town's People Inside a Small Tavern. Independently Published, 2019.
Find full textKessler, Ronald. The Terrorist Watch: Inside the Desperate Race to Stop the Next Attack. Tantor Media, 2007.
Find full textThe Terrorist Watch: Inside the Desperate Race to Stop the Next Attack. Crown Forum, 2007.
Find full text