Crimeware understanding new attacks and defenses
Saved in:
| Other Authors: | Jakobsson, Markus, Ramzan, Zulfikar |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River, NJ
Addison-Wesley
c2008
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA76.9 .A25 C75 2008 |
Similar Items
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012)
by: Clarke, Justin
Published: (2012)
Hacker
Published: (2003)
Published: (2003)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cyber reconnaissance, surveillance, and defense
by: Shimonski, Robert
Published: (2014)
by: Shimonski, Robert
Published: (2014)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Honeypots a new paradigm to information security
by: Joshi, R.C
Published: (2011)
by: Joshi, R.C
Published: (2011)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
CompTIA Security+ 2008 in depth
by: Ciampa, Mark
Published: (2008)
by: Ciampa, Mark
Published: (2008)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
Big book of IPsec RFCs Internet security architecture
by: Loshin
Published: (2000)
by: Loshin
Published: (2000)
Digital crime policing the cybernation
by: Barret
Published: (1997)
by: Barret
Published: (1997)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Cybersecurity Ops with bash attack, defend, and analyze from the command line
by: Troncone, Paul, et al.
Published: (2019)
by: Troncone, Paul, et al.
Published: (2019)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Similar Items
-
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019) -
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012) -
Hacker
Published: (2003) -
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)


