Books on the topic 'Network Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Network Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Cameron, Debra. Global network security: Threats and countermeasures. Computer Technology Research Corp., 2000.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textPhilippe, B. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full textResearch Institute for Advanced Computer Science (U.S.), ed. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full text1967-, Wright Rebecca N., and Neumann Peter 1932-, eds. Network threats: DIMCS workshop, December 2-4, 1996. American Mathematical Society, 1998.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textHubbard, Douglas W. Pulse: The new science of harnessing Internet buzz to track threats and opportunities. Wiley, 2011.
Find full textSturmer, Richard Von. A network of dissolving threads. Auckland University Press, 1991.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2008.
Find full textUnited, States Congress House Committee on Energy and Commerce Subcommittee on Communications Technology and the Internet. Cybersecurity: Network threats and policy challenges : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 1, 2009. U.S. G.P.O., 2012.
Find full textProject, Honeynet, ed. Know your enemy: Learning about security threats. 2nd ed. Addison-Wesley, 2004.
Find full textButun, Ismail, and Ian F. Akyildiz, eds. Low-Power Wide-Area Networks: Opportunities, Challenges, Risks and Threats. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32935-7.
Full textMazzocco, Dennis W. Networks of power: Corporate TV's threat to democracy. South End Press, 1994.
Find full textInternational Council of E-Commerce Consultants. Threats and defense mechanisms. Course Technology Cengage Learning, 2010.
Find full textal-Saadoo, Ghossoon M. Waleed, 1969-, editor, ed. Handbook of research on threat detection and countermeasures in network security. Information Science Reference, 2015.
Find full textPatricia, Pongracz, Mazloomi Carolyn, Women of Colour Quilters Network, and American Bible Society Gallery, eds. Threads of faith: Recent works from the Women of Color Quilters Network. Gallery of the American Bible Society, 2004.
Find full textGupta, Manish. Threats, countermeasures and advances in applied information security. Information Science Reference, 2012.
Find full textNational Aeronautics and Space Administration (NASA) Staff. Threats and Countermeasures for Network Security. Independently Published, 2018.
Find full textStavrou, Angelos. Network Availability of Internet Services: Threats and Defenses. Springer, 2020.
Find full textMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Find full textBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Full textNew 2022 Cyber Security Guide: Security Threats, Frameworks, Cryptography and Network. Independently Published, 2022.
Find full textThermos, Peter, and Ari Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, 2007.
Find full textFutter, Andrew. Threats to Euro-Atlantic Security: Views from the Younger Generation Leaders Network. Springer International Publishing AG, 2020.
Find full textFutter, Andrew. Threats to Euro-Atlantic Security: Views from the Younger Generation Leaders Network. Palgrave Macmillan, 2019.
Find full textDatt, Samir. Learning Network Forensics: Identify and Safeguard Your Network Against Both Internal and External Threats, Hackers, and Malware Attacks. Packt Publishing, Limited, 2016.
Find full textCrouthamel, Andrew. Mastering Wireshark 2: Develop skills for network analysis and address a wide range of information security threats. Packt Publishing, 2018.
Find full textCibotaru, Viorel, Attila Vincze, Przemyslaw Saganek, et al. Challenges, risks and threats for security in Europe - 11th Network Europe Conference Warsaw 19th - 22nd May 2019. Edited by Andreas Kellerhals and Tobias Baumgartner. buch & netz, 2019. http://dx.doi.org/10.36862/eiz-246.
Full textUS GOVERNMENT. Overexposed: The Threats to Privacy and Security on Filesharing Networks: Hearing Before the Committee on Government Reform, House. Government Printing Office, 2003.
Find full textCyber Security for Dummies: Internet Connections and Network Security along with Protection from Hacking and Cyber Security Threats. Independently Published, 2021.
Find full textDepartment of Defense. Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack , Countermeasures, Warfighter Cyber Security, Network Centric Warfare. Independently Published, 2017.
Find full textParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Find full textHands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. de Gruyter GmbH, Walter, 2019.
Find full textGovernment, U. S., and Department of Homeland Security. Addressing Urgent Cyber Threats to Critical Infrastructure: Report of the President's National Infrastructure Advisory Council - Innovative Recommendations Including Creation of Dark Fiber Network. Independently Published, 2018.
Find full textComputer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security along with Protection from Hacking and Cyber Security Threats. Independently Published, 2020.
Find full textComputer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats. Franelty Publications, 2020.
Find full textSturmer, Richard Von. A Network of Dissolving Threads. Auckland University Press, 2005.
Find full textArduin, Pierre-Emmanuel, and Cédric Campo-Paysaa. Insider Threats. Wiley & Sons, Incorporated, John, 2018.
Find full textMockaitis, Thomas R. Violent Extremists. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798216032472.
Full textBundle : Ethical Hacking and Countermeasures : Secure Network Operating Systems and Infrastructures , 2nd + Ethical Hacking and Countermeasures : Web Applications, 2nd + Ethical Hacking and Countermeasures: Threats and Defense Mechanisms, 2nd + Ethical. Course Technology, 2016.
Find full textConti, Mauro. Secure Wireless Sensor Networks: Threats and Solutions. Springer London, Limited, 2015.
Find full textConti, Mauro. Secure Wireless Sensor Networks: Threats and Solutions. Springer, 2015.
Find full textHajjar, Ayman El. Wireless Networks: Cyber Security Threats and Countermeasures. Springer International Publishing AG, 2023.
Find full textConti, Mauro. Secure Wireless Sensor Networks: Threats and Solutions. Springer, 2016.
Find full text