To see the other types of publications on this topic, follow the link: Internet attack.

Books on the topic 'Internet attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Internet attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Elmer, Robert. Hack attack. WaterBrook Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

E, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1953-, Rubin Charles, ed. Guerrilla marketing online attack: 100 low-cost, high-impact strategies for creating profits on the Internet. Piatkus, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Science, United States Congress House Committee on. Cyber security-how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Science. Cyber security--how can we protect American computer networks from attack?: Hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001. U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. "Cyber attack: Improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dwivedi, Himanshu. Hacking VoIP: Protocols, attacks, and countermeasures. No Starch Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krinklebine, Karlos. Hacking Wall Street: Attacks and countermeasures. [Darkwave Press], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Wenjuan, Steven Furnell, and Weizhi Meng, eds. Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-21311-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Meng, Weizhi, Moti Yung, and Jun Shao, eds. Attacks and Defenses for the Internet-of-Things. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85593-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Markus, Jakobsson, and Ramzan Zulfikar, eds. Crimeware: Understanding new attacks and defenses. Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rob, Kraus, and Borkin Mike, eds. Seven deadliest network attacks. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Parker, James N., and Philip M. Parker. Anxiety attacks: A medical dictionary, bibliography, and annotated research guide to internet references. ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Parker, Philip M., and James N. Parker. Panic attacks: A medical dictionary, bibliography, and annotated research guide to Internet references. ICON Health, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Virus Attack (Internet Detectives). Macmillan Children's Books, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gupta, B. B., and Pooja Chaudhary. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bedell, Crystal. Definitive Guide to API Attack Protection. CyberEdge Press, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mansfield, Richard. Hacker Attack!: Shield Your Computer from Internet Crime. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Dalziel, Henry, and Alejandro Caceres. How to Attack and Defend Your Website. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Schwenk, Jörg. Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Springer International Publishing AG, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mueller, Milton. Internet Governance. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.245.

Full text
Abstract:
The internet is a set of software instructions (known as “protocols”) capable of transmitting data over networks. These protocols were designed to facilitate the movement of data across independently managed networks and different physical media, and not to survive a nuclear war as the popular myth suggests. The use of the internet protocols gives rise to technical, legal, regulatory, and policy problems that become the main concern of internet governance. Because the internet is a key component of the infrastructure for a growing digital economy, internet governance has turned into an increasingly high-stakes arena for political activity. The world’s convergence on the internet protocols for computer communications, coupled with the proliferation of a variety of increasingly inexpensive digital devices that can be networked, has created a new set of geopolitical issues around information and communication technologies. These problems are intertwined with a broader set of public policy issues such as freedom of expression, privacy, transnational crime, the security of states and critical infrastructure, intellectual property, trade, and economic regulation. Political scientists and International Relations scholars have been slow to attack these problems, in part due to the difficulty of recognizing governance issues when they are embedded in a highly technological context. Internet governance is closely related to, and has evolved out of, debates over digital convergence, telecommunications policy, and media regulation.
APA, Harvard, Vancouver, ISO, and other styles
29

Publications, ICON Health. Heart Attack - A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. ICON Health Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Publications, ICON Health. The Official Patient's Sourcebook on Heart Attack: A Directory for the Internet Age. Icon Health Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

The Official Patient's Sourcebook On Transient Ischemic Attack: Directory For The Internet Age. Icon Health Publications, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Machine Learning Based Solutions for Security of Internet of Things: The IoT Hacker's. ,Security Solution,IoT Attacks,Architecture,Attack Surfaces,Challenges,Internet of Things,5g,smart Cities. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tate, Ripley. Heist: How Hackers Break into Your Email to Plunder Your Business Bank Account. Every Business Is under Attack Every Day? and Here's What to Do about It. Web Fire Communications, Inc., 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Government, U. S., U. S. Cyber Command, and Department of Defense. Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms (The Radia Perlman Series in Computer Networking and Security). Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms (The Radia Perlman Series in Computer Networking and Security). Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Borg, Bobby. Music Marketing for the Diy Musician: Creating and Executing a Plan of Attack. Leonard Corporation, Hal, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Information Warfare: Corporate attack and defence in a digital world (Computer Weekly Professional). Butterworth-Heinemann, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Borg, Bobby. Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Leonard Corporation, Hal, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Borg, Bobby. Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Leonard Corporation, Hal, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Rowman & Littlefield Publishers, Incorporated, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Music Marketing for the DIY Musician: Creating and Executing a Plan of Attack on a Low Budget. Rowman & Littlefield Publishers, Incorporated, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Music marketing for the DIY musician: Creating and executing a plan of attack on a low budget. 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Department of Defense. Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

US GOVERNMENT. "Cyber attack: Improving prevention and prosecution" : Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee ... Scottsdale, AZ, April 21, 2000 (S. hrg). [U.S. G.P.O., Supt. of Docs., Congressional Sales Office, distributor], 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cyber attack: Is the government safe? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, second session, March 2, 2000. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998. U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Terrorism, Nonproliferation, and Trade. The evolution of terrorist propaganda: The Paris attack and social media : hearing before the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, first session, January 27, 2015. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mohammed, Mohssen, and Habib ur Rehman. Honeypots and Routers: Collecting Internet Attacks. Auerbach Publishers, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography