A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reli
614 48 21MB
English Pages xxvi, 716 pàgines: il·lustracions; 24 cm + 1 disc d'ordinador [744] Year 2010;2011
Report DMCA / Copyright
DOWNLOAD FILE
593 87 9MB Read more
Understand malware analysis and its practical implementationKey Features Explore the key concepts of malware analysis an
693 71 14MB Read more
734 158 2MB Read more
The bestselling beginner Arduino guide, updated with new projects! Exploring Arduino makes electrical engineering and em
531 129 110MB Read more
943 218 5MB Read more
Leading fraktur artist Ruthanne Hartung provides instruction, patterns, inspiration. Full-color throughout. MAM origina
241 56 8MB Read more
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical imp
107 67 8MB Read more
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take
941 196 12MB Read more
Violent Pythonshows you how to move from a theoretical understanding of offensive computing concepts to a practical impl
107 63 8MB Read more
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate
2,428 271 28MB Read more