Skip to Content

Results 1 - 10 of 386

By Mitnick, Kevin
Book. English.
Published Indianapolis, Ind.; [Chichester]: Wiley, c2002

By Andress, Mandy
Book. English.
Published Indianapolis, Ind.: Sams; Hemel Hempstead: Prentice Hall, 2001

By Bishop, Matt (Matthew A.)
Book. English.
Published Boston, Mass.; London: Addison-Wesley, c2003

By Schifreen, Robert
Book. English.
Published Chichester: John Wiley, 2006

By Reid, Paul
Book. English.
Published Upper Saddle River, N.J.; London: Prentice Hall PTR, c2004

Book. English.
Published New York: Springer, c2005

By Skoudis, Ed
Book. English.
Published Upper Saddle River, N.J.; London: Prentice Hall PTR, 2003
This guide presents the real-world tools needed to prevent, detect and handle malicious code attacks. Discover how attackers install malware and how you...

By Furnell, Steven, 1970-
Book. English.
Published New York; London: Springer, c2005

By Merkow, Mark S
Book. English.
Published Upper Saddle River, N.J.: Pearson Prentice Hall, c2006

By Provos, Niels
Book. English.
Published Harlow: Addison-Wesley, 2007
This text helps readers master the configuration and maintenance of virtual honeypots which are cheaper and easier to install than traditional, physical...
Search results in RSS