A review of port scanning techniques
ACM SIGCOMM Computer Communication Review
The discipline of Internet forensics
Communications of the ACM - Program compaction
Learning to detect malicious executables in the wild
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |
From the Publisher:Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know, and then take steps to protect their systems.