Search alternatives:
computer worms » computer works, computer networks
computer terms » computer tools, computer time
computers work » computers web, computer network
computer worm » computer word, computer work, computer works

21
by Barr, Adam
Published 2018
The MIT Press
Subjects: ...Computer programmers / Anecdotes...

22
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Firewalls (Computer security) / fast...

23
by Grossman, Jeremiah
Published 2007
Syngress
Table of Contents: .... Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List...

24
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...-convex Prior -- Making Shape from Shading Work for Real-World Images -- Learning and Classification...

25
Published 2007
Springer US
Table of Contents: ... Injection Attacks -- Distributed Threat Detection and Defense -- Very Fast Containment of Scanning Worms...

26
by Axelsson, Stefan, Sands, David
Published 2006
Springer US
Table of Contents: ... with Visualization: Understanding the IDS -- Visualizing the Inner Workings of a Self Learning Classifier: Improving...

27
by Lucas, Julie
Published 2004
Addison-Wesley
Subjects: ...Computer security...

28
by Ligh, Michael Hale
Published 2011
Wiley
Table of Contents: ... -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working...

29
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing -- A Roadmap...

30
by DeStefano, Stephen
Published 2023
PACKT PUBLISHING LIMITED
Table of Contents: ... -- Animating a worm gear using shadows...

31
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Table of Contents: ... and cryptocurrencies -- Proof-of-work -- Assessing the security of cryptographic hash functions -- Overview...

32
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... for RFIDs Proactive Information Security Within Computational Security -- Fault Masking in Tri-redundant...

33
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4...

34
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / fast...

35
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection -- High-Level Active...

36
by Lucas, Michael W.
Published 2008
No Starch Press
Table of Contents: .... The Internet Road Map: DNS -- 15. Small System Services -- 16. Spam, Worms, and Viruses (Plus Email, If You...

37
by Groom, Frank M., Groom, Kevin M., Jones, Stephan
Published 2017
CRC Press
Table of Contents: ... -- The hacker strategy : expanded -- Malware, viruses, worms, bugs, and botnets -- Cryptography and the RSA...

38
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ... -- Virus, Worms, Trojans, Spyware, and Malware -- Difficult Patching/Update Process...

39
Published 1989
Springer Berlin Heidelberg
Table of Contents: ... specification -- PROTOB a hierarchical object-oriented CASE tool for distributed systems -- The internet worm...

40
Published 2007
Springer US
Table of Contents: ... in Mobile Ad Hoc Networks -- Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine...