The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
اقرأ المزيدThe goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
اقرأ المزيدThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions ...
اقرأ المزيدIntroduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their ...
اقرأ المزيدThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
اقرأ المزيدUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
اقرأ المزيدPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيدThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيدInstalling a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...
اقرأ المزيدThis book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
اقرأ المزيد