Segui questo link per vedere altri tipi di pubblicazioni sul tema: Cyber defensive.

Libri sul tema "Cyber defensive"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 libri per l'attività di ricerca sul tema "Cyber defensive".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.

1

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kott, Alexander, Cliff Wang, and Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Baddi, Youssef, Mohammed Amin Almaiah, Omar Almomani, and Yassine Maleh. The Art of Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781032714806.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Edwards, Dr Jason. Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Vijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kshetri, Naresh, Purnendu Shekhar Pandey, and Mohiuddin Ahmed. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures. CRC Press, 2024. https://doi.org/10.1201/9781003449515.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Rani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, and Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

1958-, Nemati Hamid R., and Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Information Science Reference, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Belk, Robert. On the use of offensive cyber capabilities: A policy analysis for the Department of Defense Office of Cyber Policy. John F. Kennedy School of Government, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Almomani, Iman, and Nick Ayres. Cyber Malware: Offensive and Defensive Systems. Springer International Publishing AG, 2023.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Kello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.

Testo completo
Abstract (sommario):
Europe confronts an enormous cyber threat. The continent hosted the first international cyber crisis—the 2007 attacks by Russian political activists that crashed computer infrastructures in Estonia. Large European nations such as the UK and France focus their defensive efforts on proactive measures, which seek to neutralize threats before they materialize. Another tool of large powers is deterrence by punishment, an attempt to prevent hostile action with the pledge of severe reprisal. Smaller powers, by contrast, lack the resources necessary to implement proactive measures or deterrence. They
Gli stili APA, Harvard, Vancouver, ISO e altri
15

The Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Pavisic, Ivica, Anthony Lawrence, Chaitra M. Hardison, Leslie Adrienne Payne, and Julia Whitaker. Building the Best Offensive and Defensive Cyber Workforce: Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, The, 2021.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Goldsmith, Jack, ed. The United States' Defend Forward Cyber Strategy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197601792.001.0001.

Testo completo
Abstract (sommario):
The United States’ new Defend Forward Strategy constitutes a major change in how the nation with the world’s most powerful cyber arsenal views when and how this arsenal should be deployed. It is a large step in the direction of more aggressive action in cyberspace—albeit for defensive ends. The United States has not attempted to hide this new and more aggressive cyber posture. To the contrary, it has telegraphed the change, probably in order to enhance deterrence. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defe
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.

Testo completo
Abstract (sommario):
This chapter examines defensive cyber operations in a fashion similar to kill chain analysis. It presents an outline of how baseline network defense is done, and what technologies and techniques contribute to that mission. This includes memory forensics, penetration testing, and incident response. It shows as well how those efforts are likely to be insufficient, and how advanced states have an incentive to go further and intrude into other states’ networks for defensive reasons—operations that are sometimes called counter-computer network exploitation. It is these intrusions, which are genuine
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Pavisic, Ivica, Chaitra M. Hardison, Danielle Bean, Julia Whitaker, and Jenna W. Kramer. Building the Best Offensive and Defensive Cyber Workforce: Improving U. S. Air Force Training and Development. RAND Corporation, The, 2021.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Building the Best Offensive and Defensive Cyber Workforce: Volume I, Improving U.S. Air Force Training and Development. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Building the Best Offensive and Defensive Cyber Workforce: Volume II, Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Valeriano, Brandon. The United States. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0007.

Testo completo
Abstract (sommario):
This chapter analyzes US cyber strategy and coercion against rival states. First, the chapter situates the US approach to cyber in the larger intellectual history surrounding a preference for precision strike and how it alters the character of war for US strategists. Second, the chapter connects this logic to the emergence of information warfare concepts in the early 1990s, when US practitioners began to integrate cyber into larger visions of precision strike. Next, the chapter shifts to outline the American approach to cyber coercion. We offer a portrait of how the leading cyber power uses co
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Buchanan, Ben. The Cybersecurity Dilemma. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.001.0001.

Testo completo
Abstract (sommario):
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Buchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.

Testo completo
Abstract (sommario):
This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not the intrusion was launched with offensive or defensive intent. The risk of misperception is real, and the threats enabled by a network intrusion are significant. Network intrusions offer the capacity for tailored cyber attacks, for more basic wiper attacks, for general intelligence collection and espionage, and for counterintelligence work. It is very difficult to determine the intentions of an intru
Gli stili APA, Harvard, Vancouver, ISO e altri
28

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Yang, Lin, and Quan Yu. Dynamically-Enabled Cyber Defense. World Scientific Publishing Co Pte Ltd, 2021.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Giles, Keir, Strategic Studies Institute, and Kim Hartmann. Cyber Defense: An International View. Lulu Press, Inc., 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Kott, Alexander, Cliff Wang, and Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2016.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Kott, Alexander, Cliff Wang, and Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Stiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Cyber Reconnaissance, Surveillance and Defense. Elsevier, 2015. http://dx.doi.org/10.1016/c2013-0-13412-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Cyber Defense: Countering Targeted Attacks. Government Institutes, 2011.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Cartwright, Adam. Ransomware: Threat Centric Cyber Defense. Independently Published, 2022.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Kott, Alexander, Cliff Wang, and Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Shimonski, Robert. Cyber Reconnaissance, Surveillance and Defense. Elsevier Science & Technology Books, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Giles, Keir, . Strategic Studies Institute (U.S.), Douglas C. Lovelace Jr, Kim Hartmann, and . Army War College (U.S.). Cyber Defense: An International View. Department of the Army, 2016.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Giles, Keir, Strategic Studies Institute, and Kim Hartmann. Cyber Defense: An International View. Independently Published, 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Cyber Defense and Situational Awareness. Springer, 2015.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2000.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Cyber Reconnaissance, Surveillance and Defense. Syngress, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Amoroso, Edward. Cyber Security. Silicon Press, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

McGonagle , Jr., John J., and Carolyn M. Vella. New Archetype for Competitive Intelligence. Greenwood Publishing Group, Inc., 1996. http://dx.doi.org/10.5040/9798400690716.

Testo completo
Abstract (sommario):
McGonagle and Vella maintain that competitive intelligence as we know it is just the first step toward the creation of true corporate intelligence. Their book thus explores ways in which new channels of communication and new uses of information and intelligence will change corporations, and how these changes can be anticipated now in an organization's strategic planning, crisis management, benchmarking, reverse engineering, and defensive intelligence activities. In doing so, they introduce readers to new techniques, such as shadow benchmarking and fractal management analysis. Readable, with us
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Gheorghe, A. V., U. Tatar, and Y. Gokce. Strategic Cyber Defense: A Multidisciplinary Perspective. IOS Press, Incorporated, 2017.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Newman, Maxine. U. S. Cyber Strategies. Nova Science Publishers, Incorporated, 2016.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Carayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer London, Limited, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!