A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reli
591 87 9MB
English Pages 746 Year 2010
Report DMCA / Copyright
DOWNLOAD FILE
610 48 21MB Read more
Understand malware analysis and its practical implementationKey Features Explore the key concepts of malware analysis an
693 71 14MB Read more
729 156 2MB Read more
The bestselling beginner Arduino guide, updated with new projects! Exploring Arduino makes electrical engineering and em
528 129 110MB Read more
Leading fraktur artist Ruthanne Hartung provides instruction, patterns, inspiration. Full-color throughout. MAM origina
239 56 8MB Read more
941 217 5MB Read more
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take
938 196 12MB Read more
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical imp
107 67 8MB Read more
212 134 6MB Read more
Violent Pythonshows you how to move from a theoretical understanding of offensive computing concepts to a practical impl
107 63 8MB Read more