Identifying Malicious Code Through Reverse Engineering
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | SpringerLink (Online service) |
Otros Autores: | Singh, Abhishek (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Advances in Information Security,
44 |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Publicado: (2013) -
Dynamic Secrets in Communication Security
por: Xiao, Sheng, et al.
Publicado: (2014) -
Network Science and Cybersecurity
Publicado: (2014) -
Location Privacy Protection in Mobile Networks
por: Liu, Xinxin, et al.
Publicado: (2013) -
Cyber Security Deterrence and IT Protection for Critical Infrastructures /
Publicado: (2013)