1
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

2
Published 2015
Springer International Publishing
Table of Contents: ... for Electrical Power Prediction in Buildings.-.Fish Monitoring and Sizing Using Computer Vision -- Computer-Aided...

3
by Salomon, David
Published 2006
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

4
by Ferbrache, David
Published 1992
Springer London
Table of Contents: ...1 Introduction -- 1.1 Preamble -- 1.2 What is a Computer Virus? -- 1.3 Worms: Networked Viruses...

5
by Slade, Robert
Published 1996
Springer New York
Table of Contents: ... and Data Protection -- A Short Course on Computer Viruses -- Computers under Attack: Intruders, Worms...

6
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...4. Privacy at work -- The Internet at work -- Surfing on company time -- Visit NasteePix.com, get...

7
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

8 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

9
by Filiol, Eric
Published 2005
Springer Paris
Table of Contents: ... Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Applications -- Computer Viruses...

10
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Reconfigurable Gate Array VLSI -- PISC: Polymorphic Instruction Set Computers -- Networks and Communication...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Plenary Talk I -- The Distributed Sensor Networks – An Emerging Technology -- Distributed Computing...

12
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

13
by Marchette, David J.
Published 2001
Springer New York
Table of Contents: ... Monitoring -- 6 Computer Viruses and Worms -- 7 Trojan Programs and Covert Channels -- Appendix A WellKnown...

14
Published 2009
Springer Netherlands
Table of Contents: ... Computational Model of Biology -- Patient Monitoring: Wearable Device for Patient Monitoring -- Face Recognition...

15
Published 2005
Springer US
Subjects: ...Computer Communication Networks...

16
by Russell, Brian, Van Duren, Drew
Published 2018
Packt Publishing
Subjects: ...Computer viruses, Trojans & worms / bicssc...

17
by NG, Chee Keong, Pan, Lei, Xiang, Yang
Published 2018
Springer Nature Singapore
Table of Contents: ... and their Counter-measure -- 5 Ramsonware and Honeypot -- 6 Honeypot Frameworks -- 7 Conclusion and Future Work...

18
by Barr, Adam
Published 2018
The MIT Press
Subjects: ...Computer programmers / Anecdotes...

19
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...-convex Prior -- Making Shape from Shading Work for Real-World Images -- Learning and Classification...

20
Published 2007
Springer US
Table of Contents: ... Injection Attacks -- Distributed Threat Detection and Defense -- Very Fast Containment of Scanning Worms...