1
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
.... Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design...

2
Published 2021
Springer International Publishing
Table of Contents: ... Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD...

3
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction...

4
by Termanini, Rocky
Published 2016
Auerbach
Table of Contents: ...; The S-Curve Evolution of the Digital Immunity System CEWPS; References; Websites; ; Epilogue; ; Appendix A...