Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 21 - 30 of about 48 related to The Art of Computer Virus Research and Defense.    

Recent Advances in Intrusion Detection: 14th International Symposium, RAID ...

Robin Sommer, Davide Balzarotti, Gregor Maier - Business & Economics - 2011 - 397 pages
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying ...
Limited preview - About this book

Networking For Dummies

Doug Lowe - Computers - 2009 - 432 pages
The bestselling beginning networking book is now updated to cover the latest tools and trends! Fully updated and revised to include the latest trends in networking, this ...
Limited preview - About this book

Detection of Intrusions and Malware, and Vulnerability Assessment: Third ...

Roland Büschkes, Pavel Laskov - Business & Economics - 2006 - 194 pages
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the Third GI SIG SIDAR Conference on Detection of Intrusions and Malware ...
Limited preview - About this book

CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822)

Matt Walker, Angela Walker - Computers - 2008 - 512 pages
The Best Fully Integrated Study System Available for CCENT Exam 640-822 With hundreds of practice questions and hands-on exercises, CCENT Cisco Certified Entry Networking ...
Limited preview - About this book

e-Study Guide for: Practical Computing by Lynn Hogan, ISBN 9780131585638

Cram101 Textbook Reviews - Education - 2012 - 27 pages
Never Highlight a Book Again! Just the FACTS101 study guides give the student the textbook outlines, highlights, practice quizzes and optional access to the full practice tests ...
Limited preview - About this book

Principles and practice of information security: protecting computers from ...

Linda Volonino, Stephen R. Robinson, Charles P. Volonino - Computers - 2004 - 232 pages
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security ...
Snippet view - About this book

  1. My library
  2. Help
  3. Advanced Book Search