41
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Firewalls (Computer security) / fast...

42
by Brenton, Chris
Published 2003
Sybex
Table of Contents: ...""VERITAS Storage Replicator""""Summary""; ""Chapter 12: The Wide World of Windows""; ""NT Overview...

43
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Subjects: ...Data encryption (Computer science) / fast...

44
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Worm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation...

45
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing...

46
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / fast...

47
by Hannon, Bruce, Ruth, Matthias
Published 2001
Springer New York
Table of Contents: ... Models -- 11 Mating of Alleles -- 12 Natural Selection and Mutation -- 13 Artificial Worms -- 5...

48
by Thomas, Thomas M.
Published 2004
Cisco Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

49
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China...

50
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... and Impossible Paths -- Detecting Worms and Viruses -- HoneyStat: Local Worm Detection Using Honeypots -- Fast...

51
by Molinari, Shane
Published 2023
Packt Publishing Ltd.
Table of Contents: ... Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination...

52
Published 2020
Springer International Publishing
Table of Contents: ... -- Chapter 8. Malware -- Chapter 9. SQL Injection -- Chapter 10. DoS -- Chapter 11. Worms -- Chapter 12...

53
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model...

54
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks --...

55
by Rains, Tim
Published 2023
Packt Publishing Ltd.
Table of Contents: ... and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence...

56
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Computing with CGSP -- Visual Media Retrieval Framework Using Web Service -- Proposal of Social...

57
by Sood, Aditya K.
Published 2014
Syngress
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

58
by Bodungen, Clint E., Singer, Bryan L., Shbeeb, Aaron, Hilt, Stephen
Published 2017
McGraw-Hill Education
Subjects: ...Computer security...

59
by Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents: ... Malware 319 -- Malware Types 321 -- Virus 321 -- Worm 323 -- Trojan 324 -- Botnet 324 -- Ransomware 326...

60
by Mitropoulos, Nick
Published 2020
McGraw-Hill Professional
Subjects: ...Computer security / Examinations / Study guides...