1
by Ayala, Luis
Published 2016
Springer Science+Business Media
Table of Contents: ...; Firewalls; Antivirus Programs; Forensic Evidence of a Cyber-Attack; Rootkits; Run Intrusion Detection System...