Related Books
Language: en
Pages: 237
Pages: 237
Type: BOOK - Published: 2011-12-06 - Publisher: Oldenbourg Verlag
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and the
Language: en
Pages: 749
Pages: 749
Type: BOOK - Published: 2007-07-16 - Publisher: Pearson Education
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. No
Language: en
Pages: 1375
Pages: 1375
Type: BOOK - Published: 2012-06-15 - Publisher: Springer Science & Business Media
This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelli
Language: en
Pages: 105
Pages: 105
Type: BOOK - Published: 2013-06-29 - Publisher: Springer Science & Business Media
Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic lo
Language: en
Pages: 808
Pages: 808
Type: BOOK - Published: 2015-06-11 - Publisher: CRC Press
The International Conference of Electronic Engineering and Information Science 2015 (ICEEIS 2015) was held on January 17-18, 2015, Harbin, China. This proceedin