Books on the topic 'Insider attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Insider attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.
Find full textStolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.
Full textStorad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.
Find full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.
Full textSchreyer, Paul. Inside 9/11: Neue Fakten und Hintergründe zehn Jahre danach. Kai Homilius Verlag, 2011.
Find full textM, Goldstein Donald, and Dillon Katherine V, eds. The Pearl Harbor papers: Inside the Japanese plans. Brasseyʼs (US), 1993.
Find full textBeecroft, Simon. Inside the worlds of Star wars, attack of the clones. DK Pub., 2003.
Find full textLioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.
Find full textHerrera, Juan Felipe. Cinnamon girl: Letters found inside a cereal box. Joanna Cotler books, 2005.
Find full textJim, Dwyer. 102 minutes: The untold story of the fight to survive inside the Twin Towers. Times Books, 2004.
Find full textKessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.
Find full textKessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.
Find full textJosh, Meyer, ed. The hunt for KSM: Inside the pursuit and takedown of the real 9/11 mastermind, Khalid Sheikh Mohammed. Little, Brown and Co., 2012.
Find full textLioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.
Find full textInsider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Find full textGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Find full textGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Find full textGaouette, Mark. Cruising for Trouble. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798400634673.
Full textGuitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.
Full textMeloy, J. Reid, and Jens Hoffmann, eds. International Handbook of Threat Assessment. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.001.0001.
Full textStolfo, Salvatore J., Angelos D. Keromytis, Steven M. Bellovin, Shlomo Hershkop, Sara Sinclair, and Sean W. Smith. Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2010.
Find full textWARD, D. Mae, and T. H. E. FLOWER. Werewolves Attacks the Town's People Inside a Small Tavern. Independently Published, 2019.
Find full textInside Chess Opening Novelties: KID Bayonet Attack. International Chess Enterprises, 1996.
Find full textYang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer, 2018.
Find full textHoveyda, Fereydoun. The Broken Crescent. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216187448.
Full textAust, Stefan, and Cordt Schnibben. Inside 9-11: What Really Happened. Diane Pub Co, 2002.
Find full textInside the enemy's computer: Identifying cyber-attackers. Oxford University Press, 2017.
Find full textLevy, Adrian, and Cathy Scott-Clark. Siege: Three Days of Terror Inside the Taj. Penguin Books, Limited, 2013.
Find full text