Search alternatives:
computer worlds » computer works, computer worms, computer word
computer world » computer word, computer works, computer worms
computer worm » computer worms, computer word, computer work

41
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...On the Effectiveness of Internal Patching Against File-Sharing Worms -- Peeking Through the Cloud...

42
by Brenton, Chris
Published 2003
Sybex
Table of Contents: ...""VERITAS Storage Replicator""""Summary""; ""Chapter 12: The Wide World of Windows""; ""NT Overview...

43
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Subjects: ...Data encryption (Computer science) / fast...

44
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Worm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation...

45
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing...

46
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / fast...

47
by Hannon, Bruce, Ruth, Matthias
Published 2001
Springer New York
Table of Contents: ... Models -- 11 Mating of Alleles -- 12 Natural Selection and Mutation -- 13 Artificial Worms -- 5...

48
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China...

49
by Thomas, Thomas M.
Published 2004
Cisco Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

50
by Molinari, Shane
Published 2023
Packt Publishing Ltd.
Table of Contents: ... Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination...

51
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... and Impossible Paths -- Detecting Worms and Viruses -- HoneyStat: Local Worm Detection Using Honeypots -- Fast...

52
Published 2020
Springer International Publishing
Table of Contents: ... -- Chapter 8. Malware -- Chapter 9. SQL Injection -- Chapter 10. DoS -- Chapter 11. Worms -- Chapter 12...

53
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model...

54
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks --...

55
by Rains, Tim
Published 2023
Packt Publishing Ltd.
Table of Contents: ... and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence...

56
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Computing with CGSP -- Visual Media Retrieval Framework Using Web Service -- Proposal of Social...

57
by Sood, Aditya K.
Published 2014
Syngress
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

58
by Bodungen, Clint E., Singer, Bryan L., Shbeeb, Aaron, Hilt, Stephen
Published 2017
McGraw-Hill Education
Subjects: ...Computer security...

59
Published 2024
Springer Nature Switzerland
Table of Contents: ... -- Tooth profile design theory of asymmetrical involute cylindrical worm in face worm gear drive -- Tooth...

60
by Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents: ... Malware 319 -- Malware Types 321 -- Virus 321 -- Worm 323 -- Trojan 324 -- Botnet 324 -- Ransomware 326...