To see the other types of publications on this topic, follow the link: Insider attacks.

Books on the topic 'Insider attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Insider attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schatzki, Nick. Inside 9/11. National Geographic, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Storad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Group, Express. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schreyer, Paul. Inside 9/11: Neue Fakten und Hintergründe zehn Jahre danach. Kai Homilius Verlag, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

M, Goldstein Donald, and Dillon Katherine V, eds. The Pearl Harbor papers: Inside the Japanese plans. Brasseyʼs (US), 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Beecroft, Simon. Inside the worlds of Star wars, attack of the clones. DK Pub., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Herrera, Juan Felipe. Cinnamon girl: Letters found inside a cereal box. Joanna Cotler books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jim, Dwyer. 102 minutes: The untold story of the fight to survive inside the Twin Towers. Times Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kessler, Ronald. The terrorist watch: Inside the desperate race to stop the next attack. Crown Forum, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Josh, Meyer, ed. The hunt for KSM: Inside the pursuit and takedown of the real 9/11 mastermind, Khalid Sheikh Mohammed. Little, Brown and Co., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lioy, Paul J. Dust: The inside story of its role in the September 11th aftermath. Rowman & Littlefield, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

James, Ben. Insider Dreams: A 911 Novel. Outskirts Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Brancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Brancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Brancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Attack god inside. 2.13.61, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gaouette, Mark. Cruising for Trouble. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798400634673.

Full text
Abstract:
This book offers an alarming inside look at the security preparations of the cruise industry and the potential for cruise ships to be the target for pirates, terrorists, and criminal activity. Cruising for Trouble exposes the acute vulnerability of cruise ships to piracy, terrorism, and crime, both on the high seas and in domestic and foreign ports-of-call. While cruise ships have ramped up in size and passenger capacity to become floating skyscrapers housing as many as 7,000 passengers, and while piracy incidents have increased since 2008 as the world economy has deteriorated, there has been no corresponding increase or enhancement in onboard security personnel, external tactical units, preventive screening, or coordinated response planning to guard against the growing threat of acts of piracy and internal and external terrorist attacks. Commander Gaouette reveals to cruise passengers the very real security dangers they unwittingly face when they saunter up the gangway of a cruise ship for a carefree holiday. He sounds a clarion call to national and transnational security agencies, maritime regulators, legislators, and customers to compel the cruise industry to strengthen and reform its security programs before catastrophe strikes. The author, a longtime cruise industry insider who now serves as a top maritime security official in the Department of Homeland Security, details the many security defects and vulnerabilities of cruise ships, identifies the remedies, and makes the case for their urgent implementation. Extensively documented and illustrated, Cruising for Trouble is a vividly told cautionary for the ten million Americans who taken cruise-ship vacations each year and the millions more who would like to. As well as modeling the potential threats to cruise ships from pirates and maritime terrorists—who mimic each other's methods, overlap each other's territories, and might well find it mutually beneficial to combine their forces and resources—Commander Gaoutte recounts many actual examples of cruise-ship insecurity that have been swept under the carpet or spun by the cruise industry: pirate attacks, fires, onboard crime, mass food poisonings and infections, and the mysterious disappearances of cruise-ship passengers.
APA, Harvard, Vancouver, ISO, and other styles
29

Inside the terror network. PBS Video, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Guitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.

Full text
Abstract:
Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyze unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society’s prevailing norms and powers; in national security cases, attribution reflects a state’s will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgment calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Meloy, J. Reid, and Jens Hoffmann, eds. International Handbook of Threat Assessment. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.001.0001.

Full text
Abstract:
The International Handbook of Threat Assessment, second edition, is a broad and deep exploration of the discipline of threat assessment and management, reflecting the magnitude of growth in this burgeoning scientific field over the past decade. Divided into three sections—foundations, fields of practice, and operations—this volume’s contributors include virtually all experts from the global community. New areas of work are emphasized, including lone actor terrorism, cyberthreats, insider threats, false allegations and bystanders. Established areas of work are further delineated, including workplace violence, stalking, public figure threats and attacks, direct threats of violence, proximal warning behaviors, legal issues in management, domestic violence threat assessment, honor-based violence, source interviewing, and evidence-based threat management in both secondary education and university settings. This second edition, almost twice the size of the first edition, has been written for both scholars and operators as the foundational textbook in the field.
APA, Harvard, Vancouver, ISO, and other styles
32

Stolfo, Salvatore J., Angelos D. Keromytis, Steven M. Bellovin, Shlomo Hershkop, Sara Sinclair, and Sean W. Smith. Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Lieu, Jocelyn. What Isn't There: Inside a Season of Change. PublicAffairs, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

WARD, D. Mae, and T. H. E. FLOWER. Werewolves Attacks the Town's People Inside a Small Tavern. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Panic Inside: A Self Help Guide to Panic Attacks. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lieu, Jocelyn. What Isn't There: Inside a Season of Change. Nation Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Qing. Inside radio: An attack and defense guide. 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Qing. Inside Radio: An Attack and Defense Guide. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Inside Chess Opening Novelties: KID Bayonet Attack. International Chess Enterprises, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Inside Job: The Shocking Case for a 9/11 Conspiracy. Origin Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Inside job: Unmasking the 9/11 conspiracies. Origin Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hoveyda, Fereydoun. The Broken Crescent. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216187448.

Full text
Abstract:
Militant Islamic fundamentalists blame the ills of their societies on the West, calling for the overthrow of local governments and the resumption of Jihad against the Infidels. Ambassador Hoveyda explores the historical and contemporary causes of the current wave of militant Islamic fundamentalism. If Western colonization and economic domination of the 19th and 20th centuries are to be blamed for the predicament of Muslim countries, Hoveyda asserts that Muslims also bear a great responsibility for their situation. This book shows how the triumph of fundamentalist interpretations of the Koran in the 12th century triggered the gradual decline of Islamic civilization and chronicles the history of militant Islamic movements, from the Assassins of the late 11th century to the reign of Ayatollah Khomeini. It shows why, despite their terrorist attacks in the West, fundamentalists are even more dangerous for Muslim countries that are desperately trying to catch up with the global economy to alleviate their accumulated social and economic problems. Hoveyda draws upon a lifetime of experience, as well as scholarship and the experiences of others, to provide an important insider/outsider examination of a worldwide concern.
APA, Harvard, Vancouver, ISO, and other styles
44

Aust, Stefan, and Cordt Schnibben. Inside 9-11: What Really Happened. Diane Pub Co, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

The Pearl Harbor Papers: Inside the Japanese Plans. Potomac Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

What isn't there: Inside a season of change : a journal. Nation Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Inside 9-11: What really happened. St. Martin's Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Inside the enemy's computer: Identifying cyber-attackers. Oxford University Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Spiegel, Der. Inside 9-11: What Really Happened. St. Martin's Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Levy, Adrian, and Cathy Scott-Clark. Siege: Three Days of Terror Inside the Taj. Penguin Books, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography