Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)

Buy
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.

Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

(HTML tags aren't allowed.)

Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
AJAX is a complex phenomenon that means different things to different people. Computer users appreciate that their favorite websites are now friendlier and feel more responsive. Web developers learn new skills that empower them to create sleek web applications with little effort. Indeed, everything sounds good about AJAX! At its roots, AJAX is a...
Brain Sense: The Science of the Senses and How We Process the World Around Us
Brain Sense: The Science of the Senses and How We Process the World Around Us
Have you ever wondered why you remember color images and scenes so much better than those in black and white? The answer is in the way our brains interpret and process the sights, smells, tastes, and touches that make up our lives. "Brainsense" explores brain function and the senses, and offers new insight about what makes us tick. Based...
Handbook of Approximation Algorithms and Metaheuristics
Handbook of Approximation Algorithms and Metaheuristics

Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical applications. It is the first book to comprehensively study both approximation algorithms and metaheuristics.

Starting with basic approaches, the
...


Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
This book outlines a mathematical way of thinking about the interaction of 'pure' and 'applied' computer science. I will be more subjective than is customary in science and mathematics exposition and sketch my personal vision, in terms of my own experience in pure and applied mathematics and my extensive readings in the scholarly computer science...
Federated Identity Primer
Federated Identity Primer
The conceptoffederatedidentityisnothingnew.Infact,ithasbeen around alongtime.Itjustneverreallycaughton,partiallybecauseits usage scenarioswerelimited.But,thathaschanged.Nowwiththe increased usageofcloudandInternet-basedapplications,federated identity hasstartedtogainalotoftraction.Instancesoffederated identity...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy