Search alternatives:
computer works » computers work, computer networks, complete works
computer worms » computer terms, computers work, computer networks

1
Published 2015
Springer International Publishing
Table of Contents: ... for Electrical Power Prediction in Buildings.-.Fish Monitoring and Sizing Using Computer Vision -- Computer-Aided...

2
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

3
by Salomon, David
Published 2006
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

4
by Ferbrache, David
Published 1992
Springer London
Table of Contents: ...1 Introduction -- 1.1 Preamble -- 1.2 What is a Computer Virus? -- 1.3 Worms: Networked Viruses...

5
by Slade, Robert
Published 1996
Springer New York
Table of Contents: ... and Destroy -- Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System: What...

6
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...1. Privacy at risk -- The spy on your desk -- Dawn of the undead PC -- Working for the man...

7
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

8 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

9
by Filiol, Eric
Published 2005
Springer Paris
Table of Contents: ... Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Applications -- Computer Viruses...

10
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Reconfigurable Gate Array VLSI -- PISC: Polymorphic Instruction Set Computers -- Networks and Communication...

11
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

12
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Plenary Talk I -- The Distributed Sensor Networks – An Emerging Technology -- Distributed Computing...

13
by Marchette, David J.
Published 2001
Springer New York
Table of Contents: ... Monitoring -- 6 Computer Viruses and Worms -- 7 Trojan Programs and Covert Channels -- Appendix A WellKnown...

14
Published 2005
Springer US
Subjects: ...Computer Communication Networks...

15
Published 2019
Scrivener Publishing/Wiley
Table of Contents: ... of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants...

16
Published 2009
Springer Netherlands
Table of Contents: ... Computational Model of Biology -- Patient Monitoring: Wearable Device for Patient Monitoring -- Face Recognition...

17
by Russell, Brian, Van Duren, Drew
Published 2018
Packt Publishing
Subjects: ...Computer viruses, Trojans & worms / bicssc...

18
by NG, Chee Keong, Pan, Lei, Xiang, Yang
Published 2018
Springer Nature Singapore
Table of Contents: ... and their Counter-measure -- 5 Ramsonware and Honeypot -- 6 Honeypot Frameworks -- 7 Conclusion and Future Work...

19
by Barr, Adam
Published 2018
The MIT Press
Subjects: ...Computer programmers / Anecdotes...

20
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...-convex Prior -- Making Shape from Shading Work for Real-World Images -- Learning and Classification...