Related Books
Language: en
Pages: 297
Pages: 297
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург
Covering the wide range of technologies implemented by contemporary malware programs such as rootkits, keyloggers, spyware, adware, back doors, and network and
Language: en
Pages: 444
Pages: 444
Type: BOOK - Published: 2009-07-10 - Publisher: Springer
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition
Language: en
Pages: 354
Pages: 354
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Language: en
Pages: 70
Pages: 70
Type: BOOK - Published: 2005 - Publisher:
Language: en
Pages: 595
Pages: 595
Type: BOOK - Published: 2018-12-06 - Publisher: Springer
This book presents select papers from the International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E 2018). Covering the late