Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 21 - 30 of about 48 related to The Art of Computer Virus Research and Defense.   

Network Security First-Step

Thomas M. Thomas - Computers - 2004 - 480 pages
Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to ...
Limited preview - About this book

Mathematica by Example

Martha L. L. Abell, James P. Braselton - Mathematics - 2004 - 571 pages
This third edition of Mathematica by Example is completely compatible with recent Mathematica versions. Highly readable and informative, this volume is geared toward the ...
Limited preview - About this book

Newnes Interfacing Companion: Computers, Transducers, Instrumentation and ...

Tony Fischer-Cripps - Computers - 2002 - 320 pages
Tony Fischer-Cripps is a Project Leader in the Division of Telecommunications and Industrial Physics of the CSIRO (Commonwealth Scientific & Industrial Research Organisation ...
Limited preview - About this book

Crimeware: Understanding New Attacks and Defenses

Markus Jakobsson, Zulfikar Ramzan - Computers - 2008 - 608 pages
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years ...
Limited preview - About this book

Software Security Engineering: A Guide for Project Managers

Nancy R. Mead, Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary R. McGraw - Computers - 2004 - 368 pages
Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security ...
Limited preview - About this book

Is It Safe? Protecting Your Computer, Your Business, and Yourself Online

Michael Miller - Computers - 2008 - 384 pages
Is It Safe? PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE IDENTITY THEFT. DATA THEFT. INTERNET FRAUD. ONLINE SURVEILLANCE. EMAIL SCAMS. Hacks, attacks, and ...
Limited preview - About this book

JUNOS High Availability: Best Practices for High Network Uptime

James Sonderegger, Orin Blomberg, Kieran Milne, Senad Palislamovic - Computers - 2009 - 690 pages
Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that ...
Limited preview - About this book

Junos Security: A Guide to Junos for the SRX Services Gateways and Security ...

Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn - Computers - 2010 - 848 pages
JunosŪ Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to ...
Limited preview - About this book

Cracking iPhone and Android Native Development: Cross-Platform Mobile Apps ...

Matthew Baxter-Reynolds - Computers - 2010 - 480 pages
You've developed a killer app for one mobile device—now it’s time to maximize your intellectual investment and develop for the full spectrum of mobile platforms and devices ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search