Books on the topic 'Internet attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Internet attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Prentice Hall Professional Technical Reference, 2005.
Find full textE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford University Press, 2003.
Find full text1953-, Rubin Charles, ed. Guerrilla marketing online attack: 100 low-cost, high-impact strategies for creating profits on the Internet. Piatkus, 1996.
Find full textScience, United States Congress House Committee on. Cyber security-how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.
Find full textUnited States. Congress. House. Committee on Science. Cyber security--how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.
Find full textUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. "Cyber attack: Improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. U.S. G.P.O., 2001.
Find full textDwivedi, Himanshu. Hacking VoIP: Protocols, attacks, and countermeasures. No Starch Press, 2009.
Find full textKrinklebine, Karlos. Hacking Wall Street: Attacks and countermeasures. [Darkwave Press], 2009.
Find full textLi, Wenjuan, Steven Furnell, and Weizhi Meng, eds. Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21311-3.
Full textMeng, Weizhi, Moti Yung, and Jun Shao, eds. Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85593-1.
Full textDübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.
Find full textMarkus, Jakobsson, and Ramzan Zulfikar, eds. Crimeware: Understanding new attacks and defenses. Addison-Wesley, 2008.
Find full textRob, Kraus, and Borkin Mike, eds. Seven deadliest network attacks. Syngress, 2010.
Find full textParker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. ICON Health Publications, 2003.
Find full textParker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. ICON Health, 2004.
Find full textGupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.
Find full textGupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.
Find full textGupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.
Find full textCross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.
Find full textBedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.
Find full textBedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.
Find full textMansfield, Richard. Hacker Attack!: Shield Your Computer from Internet Crime. Wiley & Sons, Incorporated, John, 2006.
Find full textDalziel, Henry, and Alejandro Caceres. How to Attack and Defend Your Website. Elsevier Science & Technology Books, 2014.
Find full textSchwenk, Jörg. Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Springer International Publishing AG, 2022.
Find full textGuide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Springer International Publishing AG, 2023.
Find full textMueller, Milton. Internet Governance. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.245.
Full textPublications, ICON Health. Heart Attack - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.
Find full textPublications, ICON Health. The Official Patient's Sourcebook on Heart Attack: A Directory for the Internet Age. Icon Health Publications, 2005.
Find full textThe Official Patient's Sourcebook On Transient Ischemic Attack: Directory For The Internet Age. Icon Health Publications, 2004.
Find full textYu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.
Find full textMachine Learning Based Solutions for Security of Internet of Things: The IoT Hacker's. ,Security Solution,IoT Attacks,Architecture,Attack Surfaces,Challenges,Internet of Things,5g,smart Cities. Independently Published, 2021.
Find full textTate, Ripley. Heist: How Hackers Break into Your Email to Plunder Your Business Bank Account. Every Business Is under Attack Every Day? and Here's What to Do about It. Web Fire Communications, Inc., 2023.
Find full textGovernment, U. S., U. S. Cyber Command, and Department of Defense. Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities. Independently Published, 2017.
Find full textMirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms (The Radia Perlman Series in Computer Networking and Security). Prentice Hall PTR, 2004.
Find full textMirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms (The Radia Perlman Series in Computer Networking and Security). Prentice Hall PTR, 2004.
Find full textBorg, Bobby. Music Marketing for the Diy Musician: Creating and Executing a Plan of Attack. Leonard Corporation, Hal, 2018.
Find full textInformation Warfare: Corporate attack and defence in a digital world (Computer Weekly Professional). Butterworth-Heinemann, 2001.
Find full textBorg, Bobby. Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Leonard Corporation, Hal, 2014.
Find full textBorg, Bobby. Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Leonard Corporation, Hal, 2014.
Find full textMusic Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Rowman & Littlefield Publishers, Incorporated, 2024.
Find full textMusic Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Rowman & Littlefield Publishers, Incorporated, 2024.
Find full textMusic marketing for the DIY musician: Creating and executing a plan of attack on a low budget. 2014.
Find full textDepartment of Defense. Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.
Find full textUS GOVERNMENT. "Cyber attack: Improving prevention and prosecution" : Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee ... Scottsdale, AZ, April 21, 2000 (S. hrg). [U.S. G.P.O., Supt. of Docs., Congressional Sales Office, distributor], 2001.
Find full textCyber attack: Is the government safe? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, second session, March 2, 2000. U.S. G.P.O., 2000.
Find full textCyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998. U.S. G.P.O., 1998.
Find full textUnited States. Congress. House. Committee on Foreign Affairs. Subcommittee on Terrorism, Nonproliferation, and Trade. The evolution of terrorist propaganda: The Paris attack and social media : hearing before the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, first session, January 27, 2015. 2015.
Find full textMohammed, Mohssen, and Habib ur Rehman. Honeypots and Routers: Collecting Internet Attacks. Auerbach Publishers, Incorporated, 2015.
Find full text