Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | SpringerLink (Online service) |
Otros Autores: | Christodorescu, Mihai (Editor ), Jha, Somesh (Editor ), Maughan, Douglas (Editor ), Song, Dawn (Editor ), Wang, Cliff (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Advances in Information Security,
27 |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
CryptoGraphics Exploiting Graphics Cards For Security /
por: Cook, Debra, et al.
Publicado: (2006) -
Guide to Wireless Network Security
por: Vacca, John R.
Publicado: (2006) -
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /
Publicado: (2010) -
Encryption for Digital Content
por: Kiayias, Aggelos, et al.
Publicado: (2010) -
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers /
Publicado: (2009)