Search alternatives:
swash » awash
slash » flash, clash, slas
swath » swat, spath
spam » span

1
by Lehtimäki, Juhani
Published 2013
J. Wiley & Sons
...Smashing...

2
by Hudson, A. Alex
Published 2013
John Wiley & Sons
... tap the full power of CoffeeScript with Smashing CoffeeScript. This full-color, practical book...

3
by Walker, Andy
Published 2005
Que
Subjects: ...Spam (Electronic mail) / http://id.loc.gov/authorities/subjects/sh98004365...

4
by Wade, Todd
Published 2022
BCS, The Chartered Institute for IT
Subjects: ...Spam / thema...

5
by Bradley, Tony
Published 2006
Syngress Publishing, Distributed by O'Reilly Media in the United States and Canada
Subjects: ...Spam filtering (Electronic mail) / http://id.loc.gov/authorities/subjects/sh2005003205...

6
by Parisi, Alessandro
Published 2019
Packt Publishing
Table of Contents: ...; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons...

7
Published 2004
Springer US
Table of Contents: ...Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks...

8
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors...

9
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ... the messenger -- Email -- Spam bam, no thank you ma'am -- Whose address is it, anyway? -- Nix those nasty pix...

10
by Biggs, DUP John
Published 2004
Apress
Table of Contents: ...1 Black Hats: Things That Go Ping in the Night -- 2 Y.O.U MayHAVE Alredy I!: Spam -- 3 Deep Cover...

11
Published 2016
Springer International Publishing
Table of Contents: ... and obfuscation security -- Spam emails, botnets and malware...

12
by Selmanaj, Drinor
Published 2024
O'Reilly Media, Inc.
... behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow...

13
by Collier, Mark D.
Published 2014
McGraw-Hill Education
Table of Contents: ... & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network...

14
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Exception Diagnosis Architecture for Open Multi-Agent Systems -- Security and Trust -- SMASH: Modular...

15
Published 2016
Springer New York
Table of Contents: ... -- Traditional Countermeasures to Unwanted Email -- Obfuscation in Spam and Scam -- Semantic Analytics...

16 Table of Contents: ...Introducing the World of Linux -- Meet Ubuntu Linux -- GNU “slash” Linux -- Installing Ubuntu...

17
by Weverka, Peter
Published 2019
John Wiley & Sons
..., smash numbers in Excel, tell your tale with PowerPoint, and keep it all organized with Outlook...

18
by Seibel, Peter
Published 2005
Apress
Table of Contents: ... -- Practical: A Spam Filter -- Practical: Parsing Binary Files -- Practical: An ID3 Parser -- Practical: Web...

19
by Smith, Joshua B.
Published 2007
Apress
Table of Contents: ... -- Practical: A URI Library -- Using Ocamldoc -- Modules and Functors -- Practical: A Spam Filter -- Practical...

20
Published 2000
Syngress
... and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending...