Resilient infrastructure for network security
Complexity - Special issue: Resilient and adaptive defense of computing networks
Hunting distributed malware with the κ-calculus
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Hi-index | 0.00 |
Malicious Mobile Code provides comprehensive information for each type of attack. In addition to describing how the attack works, the book provides the technical details you need to understand why the attack works. Each chapter on a type of attack includes specific information about protecting your system from that type of attack.