Books on the topic 'Threats and Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Threats and Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Nardone, Massimo. Cybersecurity Threats and Attacks in the Gaming Industry. Apress, 2025. https://doi.org/10.1007/979-8-8688-1492-1.
Full textSambănth Khmaer Jaṃrẏan niṅ Kārbārsiddhi Manuss. Attacks & threats against human rights defenders in Cambodia 2007. LICADHO, 2008.
Find full textSambănth Khmaer Jaṃrẏan niṅ Kārbārsiddhi Manuss. Attacks & threats against human rights defenders in Cambodia 2010-2012. Cambodian League for the Promotion and Defense of Human Rights, 2012.
Find full textW, Frazier Thomas, Richardson Drew C, and International Conference on Food and Agricultural Security (1998), eds. Food and agricultural security: Guarding against natural threats and terrorist attacks affecting health, national food supplies, and agricultural economics. New York Academy of Sciences, 1999.
Find full textUnited States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities. Able Danger program: Joint hearing before the Terrorism, Unconventional Threats and Capabilities Subcommittee meeting jointly with Strategic Forces Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Ninth Congress, second session, hearing held, February 15, 2006. U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Assessing September 11th health effects: Hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 8, 2004. U.S. G.P.O., 2005.
Find full textInstitute of Medicine (U.S.). Board on Health Sciences Policy, National Research Council (U.S.). Board on Chemical Sciences and Technology, National Research Council (U.S.). Board on Life Sciences, and National Academies Press (U.S.), eds. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. National Academies Press, 2011.
Find full textUnited States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities. Ten years on: The evolution of the terrorist threat since 9/11 : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held June 22, 2011. U.S. G.P.O., 2011.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Assessing September 11 health effects: What should be done? : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 28, 2003. U.S. G.P.O., 2004.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. The 9/11 Commission recommendations on public diplomacy: Defending ideals and defining the message : hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, August 23, 2004. U.S. G.P.O., 2005.
Find full textCapabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. The future of U.S. Special Operations Forces: Hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 11, 2012. U.S. G.P.O., 2012.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Combating terrorism: Chemical plant security : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, February 23, 2004. U.S. G.P.O., 2004.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Combating terrorism: Visas still vulnerable : hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, September 13, 2005. U.S. G.P.O., 2005.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Combating terrorism: Preparing and funding first responders : hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 9, 2003. U.S. G.P.O., 2004.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Combating terrorism: Assessing federal assistance to first responders : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 15, 2003. U.S. G.P.O., 2004.
Find full textMishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.
Find full textMishra, Bimal Kumar. Understanding Cyber Threats and Attacks. Nova Science Publishers, Incorporated, 2020.
Find full textKithome, Anthony. Managing Threats of Cyber-Attacks on Mobile Devices. GRIN Verlag GmbH, 2018.
Find full textCordesman, Anthony H. Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction. Praeger, 2001. http://dx.doi.org/10.5040/9798216024453.
Full textFranck, Thomas M. Recourse to Force: State Action Against Threats and Armed Attacks. Cambridge University Press, 2009.
Find full textFranck, Thomas M. Recourse to Force: State Action Against Threats and Armed Attacks. Cambridge University Press, 2009.
Find full textFranck, Thomas M. Recourse to Force: State Action Against Threats and Armed Attacks. Cambridge University Press, 2005.
Find full textFranck, Thomas M. Recourse to Force: State Action Against Threats and Armed Attacks. Cambridge University Press, 2002.
Find full textAttacks & threats against human rights defenders in Cambodia, 2008-2009. Cambodian League for the Promotion and Defense of Human Rights, 2010.
Find full textRecourse to force: State action against threats and armed attacks. Cambridge University Press, 2002.
Find full textBorum, Randy. Targeted Violence in Schools. Edited by Phillip M. Kleespies. Oxford University Press, 2015. http://dx.doi.org/10.1093/oxfordhb/9780199352722.013.9.
Full textSilence Satan: Shutting down the Enemy's Attacks, Threats, Lies, and Accusations. Charisma Media, 2014.
Find full textSilence Satan: Shutting down the Enemy's Attacks, Threats, Lies, and Accusations. Charisma Media, 2014.
Find full text(Editor), John Rendler, ed. Front Line USA : Threats, Attacks, Arrests and Harassment of Human Rights Defenders. Front Line, 2004.
Find full textMedicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council, and Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Find full textstephen, opollo, and Odongo Charles. Computer Systems under Cyber Attacks: Computers and Networks under Intruder Threats, Vulnerabilities and Risks. Independently Published, 2022.
Find full textManto, Charles, George Baker III, and Terry Donat. Triple Threat Power Grid Exercise: High Impact Threats Workshop and Tabletop Exercises Examining Extreme Space Weather, Emp and Cyber Attacks. Westphalia Press, 2015.
Find full textMastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Find full textCybersecurity Threats, Malware Trends, and Strategies: Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks. Packt Publishing, Limited, 2020.
Find full textClarke, Lee. Terrorism and Disaster, Volume 11: New Threats, New Ideas (Research in Social Problems and Public Policy). JAI Press, 2003.
Find full textMcPhee, Michael. Mastering Kali Linux for Web Penetration Testing: The ultimate defense against complex organized threats and attacks. Packt Publishing, 2017.
Find full textGOVERNMENT, US. 21st Century U.S. Military Documents: EMP Attack, Electromagnetic Pulse Threats, Report of the Commission to Assess the Threat to the United States from ... High-Altitude Nuclear Weapon EMP Attacks. Progressive Management, 2004.
Find full textMastering Linux Security and Hardening: Protect Your Linux Systems from Intruders, Malware Attacks, and Other Cyber Threats. de Gruyter GmbH, Walter, 2020.
Find full textHilliard, Donald Jr. Faith In The Face Of Fear: A Christian Response To The 9-11 Attacks And Ongoing Threats. Evergreen Press (AL), 2002.
Find full textDepartment of Defense. 21st Century Complete Guide to Electromagnetic Pulse (EMP) Attack Threats, Report of the Commission to Assess the Threat to the United States from Electromagnetic ... High-Altitude Nuclear Weapon EMP Attacks. Progressive Management, 2004.
Find full textDatt, Samir. Learning Network Forensics: Identify and Safeguard Your Network Against Both Internal and External Threats, Hackers, and Malware Attacks. Packt Publishing, Limited, 2016.
Find full textMeloy, J. Reid, and Jens Hoffmann, eds. International Handbook of Threat Assessment. 2nd ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.001.0001.
Full textSimon, Robert, ed. Il giornalismo sotto attacco. Nomos Verlagsgesellschaft mbH & Co. KG, 2019. http://dx.doi.org/10.5771/9783748904977.
Full textDepartment of Defense. Defense Support to Civil Authorities - Doctrinal Shortfalls During Cyber Attacks - Analysis of DSCA Doctrine and Cyber Threats, Response to Critical Infrastructure Attack During Combat Operations. Independently Published, 2019.
Find full textTevault, Donald A. Mastering Linux Security and Hardening: Protect Your Linux Systems from Intruders, Malware Attacks, and Other Cyber Threats, 2nd Edition. Packt Publishing, Limited, 2020.
Find full textDunkerley, Mark, and Matt Tumbarello. Mastering Windows Security and Hardening: Secure and Protect Your Windows Environment from Intruders, Malware Attacks, and Other Cyber Threats. Packt Publishing, Limited, 2020.
Find full textDavis, Jim A., and Barry R. Schneider, eds. The Gathering Biological Warfare Storm. Greenwood Publishing Group, Inc., 2004. http://dx.doi.org/10.5040/9798400655715.
Full text