Search alternatives:
computers work » computers web, computer network
complete works » complex networks
computer worms » computer works, computer terms, computer networks

1
by Salomon, David
Published 2006
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

2
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ...1. Privacy at risk -- The spy on your desk -- Dawn of the undead PC -- Working for the man...

3
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

4 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

5
by Lucas, Michael W.
Published 2008
No Starch Press
Table of Contents: .... The Internet Road Map: DNS -- 15. Small System Services -- 16. Spam, Worms, and Viruses (Plus Email, If You...

6
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....The Computer Age -- 6.How AES Works -- 7.Selecting Cryptography: the Process -- 8.Summary -- Chapter Review...

7
by Mischel, Magnus
Published 2009
Packt Pub.
Subjects: ...Computer security / Software / blmlsh...

8
by Lucas, Julie
Published 2004
Addison-Wesley
Subjects: ...Computer security...

9
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ...Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms...

10
Published 2022
Packt Publishing
Subjects: ...Cyber intelligence (Computer security) / http://id.loc.gov/authorities/subjects/sh2011005959...

11
Published 2017
Springer International Publishing
Table of Contents: ... Mohan and Sandipan Bandyopadhyay -- Computing the safe working zone of a 3-RRS parallel manipulator...