Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Malicious attacks.

Książki na temat „Malicious attacks”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 24 najlepszych książek naukowych na temat „Malicious attacks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.

1

M, Johansson Jesper, ed. Windows vista security: Securing vista against malicious attacks. Wiley Technology Pub., 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sun, Kun, and Shu Wang. Secure Voice Processing Systems against Malicious Voice Attacks. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44748-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chen, Bo, Tongxiang Li, Wen-An Zhang, and Li Yu. Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-9396-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jiang, Jiaojiao, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, and Wanlei Zhou. Malicious Attack Propagation and Source Identification. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02179-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

United States. Congress. House. Committee on Science. Subcommittee on Technology. The love bug virus: Protecting lovesick computers from malicious attack : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, May 10, 2000. U.S. G.P.O., 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Grimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Grimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley & Sons, Incorporated, John, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Secure Voice Processing Systems Against Malicious Voice Attacks. Springer, 2023.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.

Pełny tekst źródła
Streszczenie:
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, t
Style APA, Harvard, Vancouver, ISO itp.
10

Kleymenov, Alexey, and Amr Thabet. Mastering Malware Analysis: A Malware Analyst's Practical Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. Packt Publishing, Limited, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Mastering Malware Analysis: The Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. de Gruyter GmbH, Walter, 2019.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Mastering Malware Analysis: The Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. Packt Publishing, Limited, 2019.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Mastering Malware Analysis,: A Malware Analyst's Practical Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. de Gruyter GmbH, Walter, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Pełny tekst źródła
Streszczenie:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems a
Style APA, Harvard, Vancouver, ISO itp.
15

Web Application Security for Beginners: Create and Develop Your Security Toolkit, Avoid Common Hacks, and Defend Against Malicious Attacks Quickly. Independently Published, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Guitton, Clement. Introduction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.003.0001.

Pełny tekst źródła
Streszczenie:
The introduction sets to explain why it is important to look at the question of attribution: in short, it is central to defense and deterrence strategies. Furthermore, the introduction presents the different nuances of sponsorships to distinguish: from writing code without being aware of its intended malicious use, to states refusing to cooperate in investigations. The chapter goes on with exposing three common misconceptions that have permeated the debate on attribution: that it is a technical problem; that it is unsolvable; and that it is unique. These misconceptions will be debunked in turn
Style APA, Harvard, Vancouver, ISO itp.
17

Zhou, Wanlei, Yang Xiang, Bo Liu, Sheng Wen, Shui Yu, and Jiaojiao Jiang. Malicious Attack Propagation and Source Identification. Springer, 2018.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Zhdanova, Mariia, and Dariya Orlova. Ukraine. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190931407.003.0003.

Pełny tekst źródła
Streszczenie:
This chapter examines the state of computational propaganda in Ukraine, focusing on two major dimensions: Ukraine’s response to the challenges of external information attacks, and the use of computational propaganda in internal political communication. Based on interviews with Ukrainian media experts, academics, industry insiders, and bot developers, the chapter explores the scale of the issue and identifies the most common tactics, instruments, and approaches for the deployment of political bots online. The cases described illustrate the misconceptions about fake accounts, paid online comment
Style APA, Harvard, Vancouver, ISO itp.
19

Schell, Bernadette H. The Internet and Society. ABC-CLIO, 2006. http://dx.doi.org/10.5040/9798400671661.

Pełny tekst źródła
Streszczenie:
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbookexplores both the positive aspects of the Internet and its darker side. Topically organized, it chr
Style APA, Harvard, Vancouver, ISO itp.
20

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Pełny tekst źródła
Streszczenie:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital a
Style APA, Harvard, Vancouver, ISO itp.
21

Chałubińska-Jentkiewicz, Katarzyna, Mirosław Karpiuk, and Jarosław Kostrubiec. The Legal Status of Public Entities in the Field of Cybersecurity in Poland. Institute for Local Self-Government Maribor, 2021. http://dx.doi.org/10.4335/2021.5.

Pełny tekst źródła
Streszczenie:
This monograph provides an in-depth look at the organisation of the national cybersecurity system and the tasks and responsibilities of the entities operating within this system. The objective of the national cybersecurity system is to ensure cybersecurity at the national level, including the uninterrupted provision of essential services and digital services by achieving the appropriate level of security of the information systems used to provide these services and ensuring the handling of incidents. The EU legislators have been explicit in noting that the scale, frequency, and impact of cyber
Style APA, Harvard, Vancouver, ISO itp.
22

Herring, Jonathan. 6. Non-Fatal Non-Sexual Offences Against the Person. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198811817.003.0006.

Pełny tekst źródła
Streszczenie:
This chapter discusses a wide range of offences against the person: from an unwanted touching on an arm to a life-threatening attack. Key to the law is the right to bodily integrity: a person should not be touched against his or her wishes. This right is protected under the common law and Article 8 of the European Convention on Human Rights. Topics covered include assault and battery; assault occasioning actual bodily harm; malicious wounding; wounding with intent; poisoning; racially and religiously aggravated crimes; the Protection from Harassment Act 1997; threats offences; transmitting dis
Style APA, Harvard, Vancouver, ISO itp.
23

US GOVERNMENT. The love bug virus: Protecting lovesick computers from malicious attack : Hearing before the Subcommittee on Technology of the Committee on Science, House ... Sixth Congress, second session, May 10, 2000. For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Kraemer, Ross Shepard. The Mediterranean Diaspora in Late Antiquity. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190222277.001.0001.

Pełny tekst źródła
Streszczenie:
The alliance of the Roman Empire with the emerging orthodox Christian church in the early fourth century had profound consequences for the large population of Greek- (and Latin-)speaking Jews living across the Mediterranean diaspora. No known writings survive from diaspora Jews. Their experiences must be gleaned from unreliable accounts of Christian bishops and historiographers, surviving laws, and limited material evidence—synagogue sites, inscriptions, a few papyrus documents. Long neglected by historians, the diaspora population, together with its distinctive cultural forms, appears in decl
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!