Search alternatives:
complete works » complex networks
computer worms » computer works, computer terms, computers work
computer word » computer wird, computer worm, computers work
computer work » computers work, computer works, computer worm

1
by Salomon, David
Published 2006
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

2
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...4. Privacy at work -- The Internet at work -- Surfing on company time -- Visit NasteePix.com, get...

3
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

4 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

5
by Lucas, Michael W.
Published 2008
No Starch Press
Table of Contents: .... The Internet Road Map: DNS -- 15. Small System Services -- 16. Spam, Worms, and Viruses (Plus Email, If You...

6
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

7
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ... -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness...

8
by Lucas, Julie
Published 2004
Addison-Wesley
Subjects: ...Computer security...

9
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Firewalls (Computer security) / fast...

10
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / fast...

11
Published 2017
Springer International Publishing
Table of Contents: ... Mohan and Sandipan Bandyopadhyay -- Computing the safe working zone of a 3-RRS parallel manipulator...