169 91 21MB
English Pages xxvi, 716 pàgines: il·lustracions; 24 cm + 1 disc d'ordinador [744] Year 2010;2011
Report DMCA / Copyright
DOWNLOAD PDF FILE
A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reli
283 88 5MB Read more
Understand malware analysis and its practical implementationKey Features Explore the key concepts of malware analysis an
326 73 14MB Read more
840 78 22MB Read more
New York: McGrawHill, 2011. — 223 p.Most equity research analysts learn their trade on the job by apprenticing under a s
1,355 220 14MB Read more
Between the standard Java Runtime and the Bouncy Castle APIs there is a rich tool set of APIs to help work with the maze
117 79 5MB Read more
487 61 4MB Read more
Cryptography is about the security of communications. It provides mechanisms for hiding messages from outside observers,
107 52 4MB Read more
Leading fraktur artist Ruthanne Hartung provides instruction, patterns, inspiration. Full-color throughout. MAM origina
142 27 8MB Read more
475 60 5MB Read more
180 98 2MB Read more