Mihai Christodorescu · Somesh Jha · Douglas Maughan · Dawn Song · Cliff Wang
Mrt. 2007 · Advances in Information SecurityBoek 27 · Springer Science & Business Media
2,5star
15 resensiesreport
E-boek
312
Bladsye
Voorbeeld
reportGraderings en resensies word nie geverifieer nie. Kom meer te wete
Meer oor hierdie e-boek
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e., the good guys are falling behind in the arms race.
Malware Detection captures the state of the art research in the area of malicious code detection, prevention and mitigation.
Reeks
Rekenaars en tegnologie
Graderings en resensies
2,5
15 resensies
5
4
3
2
1
Gradeer hierdie e-boek
Sê vir ons wat jy dink.
Lees inligting
Slimfone en tablette
Installeer die Google Play Boeke-app vir Android en iPad/iPhone. Dit sinkroniseer outomaties met jou rekening en maak dit vir jou moontlik om aanlyn of vanlyn te lees waar jy ook al is.
Skootrekenaars en rekenaars
Jy kan jou rekenaar se webblaaier gebruik om na oudioboeke wat jy op Google Play gekoop het, te luister.
E-lesers en ander toestelle
Om op e-inktoestelle soos Kobo-e-lesers te lees, moet jy ’n lêer aflaai en dit na jou toestel toe oordra. Volg die gedetailleerde hulpsentrumaanwysings om die lêers na ondersteunde e-lesers toe oor te dra.