Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
Saved in:
| Main Author: | Davis, Michael A. |
|---|---|
| Other Authors: | Bodmer, Sean M., LeMasters, Aaron |
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw Hill
2010.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Hacking exposed Linux Linux security secrets & solutions
Published: (2008)
Published: (2008)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010)
by: Cache, Johnny
Published: (2010)
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007)
by: Cache, Johnny
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Wright, Joshua, et al.
Published: (2015)
by: Wright, Joshua, et al.
Published: (2015)
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011)
by: Ligh, Michael Hale, et al.
Published: (2011)
A framework of determining the malware factor of suspicious files based on its behaviours
by: Nur Shamimi Che Anuar
Published: (2015)
by: Nur Shamimi Che Anuar
Published: (2015)
Security in computing systems challenges, approaches and solutions
by: Biskup ,J. (Joachim)
Published: (2009)
by: Biskup ,J. (Joachim)
Published: (2009)
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014)
by: Gomzin, Slava
Published: (2014)
Hands-on ethical hacking and network defense
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Ninja hacking unconventional penetration testing tactics and techniques
by: Wilhelm, Thomas
Published: (2011)
by: Wilhelm, Thomas
Published: (2011)
Introduction to computer security
by: Bishop, Matt (Matthew A.)
Published: (2005)
by: Bishop, Matt (Matthew A.)
Published: (2005)
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Gray hat hacking the ethical hacker's handbook
Published: (2011)
Published: (2011)
Gray hat hacking the ethical hacker's handbook
by: Harris, Shon
Published: (2008)
by: Harris, Shon
Published: (2008)
IT auditing using controls to protect information assets
by: Davis, Chris (Christopher Michael)
Published: (2011)
by: Davis, Chris (Christopher Michael)
Published: (2011)
SonicWALL secure wireless network integrated solutions guide
by: Tran, Khai
Published: (2008)
by: Tran, Khai
Published: (2008)
Software security building security in
by: McGraw, Gary, 1966-
Published: (2006)
by: McGraw, Gary, 1966-
Published: (2006)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Computer security
by: Gollman
Published: (2006)
by: Gollman
Published: (2006)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Security awareness applying practical security in your world
by: Ciampa
Published: (2007)
by: Ciampa
Published: (2007)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Similar Items
-
Hacking exposed Linux Linux security secrets & solutions
Published: (2008) -
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999) -
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999) -
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013) -
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)


