Electronic Books

Total Books: 1 - 20 /33
Anti-Spam Measures

The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...

Lire la suite
Anti-Spam Measures

The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...

Lire la suite
NoIMG
Anti-fragile ICT Systems

This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions ...

Lire la suite
Anti-fragile ICT Systems

Introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their ...

Lire la suite
Computer Viruses and Malware

This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...

Lire la suite
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

Lire la suite
Cyber Security : Critical Infrastructure Protection / Martti Lehto, Pekka Neittaanmäki

Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...

Lire la suite
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

Lire la suite
Honeypots for Windows

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...

Lire la suite
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

Lire la suite
Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...

Lire la suite
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Lire la suite
Intelligence and Security Informatics : First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings

This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...

Lire la suite
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

Lire la suite
Total Books: 1 - 20 /33