A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reli
588 87 9MB
English Pages 746 Year 2010
Report DMCA / Copyright
DOWNLOAD FILE
609 48 21MB Read more
Understand malware analysis and its practical implementationKey Features Explore the key concepts of malware analysis an
688 70 14MB Read more
713 155 2MB Read more
925 216 5MB Read more
Leading fraktur artist Ruthanne Hartung provides instruction, patterns, inspiration. Full-color throughout. MAM origina
229 56 8MB Read more
The bestselling beginner Arduino guide, updated with new projects! Exploring Arduino makes electrical engineering and em
522 127 110MB Read more
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take
922 194 12MB Read more
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical imp
107 67 8MB Read more
209 134 6MB Read more
Violent Pythonshows you how to move from a theoretical understanding of offensive computing concepts to a practical impl
107 63 8MB Read more