Countering cyber attacks and preserving the integrity and availability of critical systems
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
Saved in:
| Other Authors: | Geetha, S. 1979 (Editor), Phamila, Asnath Victy 1978 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
IGI Global
2019
|
| Series: | Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Instruction detection network security beyond the firewall
by: Escamilla
Published: (1998)
by: Escamilla
Published: (1998)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide /
by: Chapple, Mike, et al.
Published: (2024)
by: Chapple, Mike, et al.
Published: (2024)
Similar Items
-
Network security attacks and countermeasures
Published: (2016) -
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014) -
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)


