Electronic Books

Total Books: 1 - 16 /16
Anti-Spam Measures

The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...

Weiterlesen
Anti-Spam Measures

The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...

Weiterlesen
NoIMG
Anti-fragile ICT Systems

This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions ...

Weiterlesen
Anti-fragile ICT Systems

Introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their ...

Weiterlesen
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

Weiterlesen
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Weiterlesen
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

Weiterlesen
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

Weiterlesen
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Weiterlesen
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

Weiterlesen
Malware Detection

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...

Weiterlesen
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Total Books: 1 - 16 /16