Search alternatives:
computer works » computers work, computer networks, complete works
computer worms » computer terms, computers work, computer networks
computers web » computers _

1
Published 2015
Springer International Publishing
Table of Contents: ... for Electrical Power Prediction in Buildings.-.Fish Monitoring and Sizing Using Computer Vision -- Computer-Aided...

2
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...4. Privacy at work -- The Internet at work -- Surfing on company time -- Visit NasteePix.com, get...

3 Table of Contents: ...Vulnerability Testing -- Auditing -- Vulnerabilities -- Chapter 16 Review -- Chapter 17 Web...

4
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Firewalls (Computer security) / fast...

5
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Web Browsing of Images in Mobile Computing Environment: Experiments and Observations -- An Incremental...

6
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

7
by Marchette, David J.
Published 2001
Springer New York
Table of Contents: ... Monitoring -- 6 Computer Viruses and Worms -- 7 Trojan Programs and Covert Channels -- Appendix A WellKnown...

8
Published 2005
Springer US
Table of Contents: ... Faults -- Multimedia Security -- Web Application Security—Past, Present, and Future -- Securing JPEG2000...

9
Published 2009
Springer Netherlands
Table of Contents: ... Computational Model of Biology -- Patient Monitoring: Wearable Device for Patient Monitoring -- Face Recognition...

10
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... safe -- How Web blocking and parental controls work -- How personal Firewalls and Proxy Servers protect...

11
by Grossman, Jeremiah
Published 2007
Syngress
Table of Contents: .... Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List...

12
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... for Protecting Master-Key of Data Centre Web Server in Online Banking -- An Automated Worm Containment Scheme...

13
by Lucas, Michael W.
Published 2008
No Starch Press
Table of Contents: .... The Internet Road Map: DNS -- 15. Small System Services -- 16. Spam, Worms, and Viruses (Plus Email, If You...

14
by NG, Chee Keong, Pan, Lei, Xiang, Yang
Published 2018
Springer Nature Singapore
Table of Contents: ... and their Counter-measure -- 5 Ramsonware and Honeypot -- 6 Honeypot Frameworks -- 7 Conclusion and Future Work...

15
by Axelsson, Stefan, Sands, David
Published 2006
Springer US
Table of Contents: ... with Visualization: Understanding the IDS -- Visualizing the Inner Workings of a Self Learning Classifier: Improving...

16
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing -- A Roadmap...

17
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction...

18
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4...

19
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection -- High-Level Active...

20
by Groom, Frank M., Groom, Kevin M., Jones, Stephan
Published 2017
CRC Press
Table of Contents: ... -- The hacker strategy : expanded -- Malware, viruses, worms, bugs, and botnets -- Cryptography and the RSA...