Rising AntiVirus
Add savedProdukt merken Saved zur Merkliste
CHF 28.80
Rising AntiVirus
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.Rising is a Chinese software company that produces the anti-virus software Rising Antivirus, a firewall, UTM and spam-blocking products.Founded in 1991, Rising is a privately-owned company, with its global headquarters based in Zhongguancun in Beijing, China. ...
An Artificial Immune Antivirus System
Add savedProdukt merken Saved zur Merkliste
CHF 80.10
An Artificial Immune Antivirus System
In this book, we consider the aspects of designing a computer immune system for virus detection and elimination using components and techniques found in the biological immune system. In the modeling of the biological immune system, we consider the use of three different kinds of loose matching: Hamming Distance, R-Contiguous Symbols, and Hidden Markov M odels (HMMs). Experiments with ...
Foundations and Practice of Security
Add savedProdukt merken Saved zur Merkliste
Weltbild
CHF 59.00
Foundations and Practice of Security
Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communication Security.- Malware and Antivirus.- Web, Cloud, and Delegation.- Physical Security.
Malware Detection in Cloud Computing
Add savedProdukt merken Saved zur Merkliste
eUniverse
CHF 57.90
Malware Detection in Cloud Computing
This book advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables identification of malicious and unwanted software by multiple detection engines Respectively,This approach provides several important benefits including better detection of malicious software, enhanced forensics capabilities and improved de...
Gin Tama. Bd.29
Add savedProdukt merken Saved zur Merkliste
eUniverse
CHF 8.00
Gin Tama. Bd.29
Auch Maschinen können krank werden - das müssen Gintoki und Co lernen, als Otose-sans Mechanicon-Maid Tama sich plötzlich einen Computervirus einfängt. Um sie zu retten, lässt sich die Alles-Agentur mithilfe eines Wunderhammers schrumpfen und dringt in Tamas Inneres vor. Und dort wartet auf sie ein großes Abenteuer, denn in Tamas Inneren hat sich inzwischen ein ganzes Königreich von A...
Metamorphic Computer Virus Detection
Add savedProdukt merken Saved zur Merkliste
CHF 76.95
Metamorphic Computer Virus Detection
A metamorphic computer virus employs different obfuscation techniques to mutate its code, in its new instance in the new infected file. The mutated instance has the similar behavior and function of the original virus, but the binary pattern of the code is entirely different from its parent. Therefore, metamorphic variants of a virus family cannot be simply detected by most of commerci...
Unified Threat Management
Add savedProdukt merken Saved zur Merkliste
CHF 28.80
Unified Threat Management
High Quality Content by WIKIPEDIA articles! Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations. In theory, it is the evolution of the traditional firewall into an all-inclusive security product that has the a...
Economics of Information Security and Privacy III
Add savedProdukt merken Saved zur Merkliste
Weltbild
CHF 177.00
Economics of Information Security and Privacy III
The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, a...
Vundo
Add savedProdukt merken Saved zur Merkliste
CHF 32.55
Vundo
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a Trojan horse that is known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehavior including performance d...
Rogue Security Software
Add savedProdukt merken Saved zur Merkliste
CHF 32.55
Rogue Security Software
Rogue security software (or rogueware) is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware. Rogue security software, in recent years (2008 2011), has become a growing and serious security threat in desktop computing.Rogue security software mainly relies on social engineering (fraud) in o...
Mathematical and Engineering Methods in Computer Science
Add savedProdukt merken Saved zur Merkliste
Weltbild
CHF 118.00
Mathematical and Engineering Methods in Computer Science
Programming Support for Future Parallel Architectures.- Flexible Interpolation for Efficient Model Checking.- Understanding Transparent and Complicated Users as Instances of Preference Learning for Recommender Systems.- Span-Program-Based Quantum Algorithms for Graph Bipartiteness and Connectivity.- Fitting Aggregation Operators.- Practical Exhaustive Generation of Small Multiway Cuts...
Evaluation of Diff. VPN Tunneling Techniques in Virtualized Datacenter
Add savedProdukt merken Saved zur Merkliste
CHF 66.65
Evaluation of Diff. VPN Tunneling Techniques in Virtualized Datacenter
The security of VPN mostly relies on authentication and encryption. The best tunneling protocol must be in use for achieving good results and maintaining better security. The latest type of VPN introduces SSL, which only supported in web servers and browsers. The purpose of SSL is to reduce the complexity of IPsec. IPsec is the best tunnel for encryption because it is in use in differ...
Metasploit
Add savedProdukt merken Saved zur Merkliste
CHF 41.25
Metasploit
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metaspl...
Cybersecurity Essentials
Add savedProdukt merken Saved zur Merkliste
eUniverse
CHF 46.90
Cybersecurity Essentials
Introduction xixPART I SECURING THE INFRASTRUCTURE 1Chapter 1 Infrastructure Security in the Real World 3Security Challenges 3Infrastructure Security Scenario 1 4Infrastructure Security Scenario 2 6Summary 8Chapter 2 Understanding Access-Control and Monitoring Systems 9A Quick Primer on Infrastructure Security 9Access Control 12Security Policies 14Physical Security Controls 15Locks an...
undefined, Rising AntiVirus

undefined

Rising AntiVirus

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online.Rising is a Chinese ...

CHF 28.80

1 Anbieter

undefined, An Artificial Immune Antivirus System

undefined

An Artificial Immune Antivirus System

In this book, we consider the aspects of designing a computer immune system for virus detection and elimination using components and techniques fou...

CHF 80.10

1 Anbieter

undefined, Foundations and Practice of Security

undefined

Foundations and Practice of Security

Malware and Anomaly Detection.- Intrusion Response.- Vulnerability Analysis and Security Metrics.- Privacy and Verification.- Crypto and Communicat...

ab CHF 59.00

2 Anbieter

undefined, Malware Detection in Cloud Computing

undefined

Malware Detection in Cloud Computing

This book advocates a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This model enables ...

CHF 57.90

1 Anbieter

undefined, Gin Tama. Bd.29

undefined

Gin Tama. Bd.29

Auch Maschinen können krank werden - das müssen Gintoki und Co lernen, als Otose-sans Mechanicon-Maid Tama sich plötzlich einen Computervirus einfä...

ab CHF 8.00

2 Anbieter

undefined, Metamorphic Computer Virus Detection

undefined

Metamorphic Computer Virus Detection

A metamorphic computer virus employs different obfuscation techniques to mutate its code, in its new instance in the new infected file. The mutated...

CHF 76.95

1 Anbieter

undefined, Unified Threat Management

undefined

Unified Threat Management

High Quality Content by WIKIPEDIA articles! Unified Threat Management (UTM) is a comprehensive solution that has recently emerged in the network se...

CHF 28.80

1 Anbieter

undefined, Economics of Information Security and Privacy III

undefined

Economics of Information Security and Priv...

The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Undergro...

ab CHF 177.00

2 Anbieter

undefined, Vundo

undefined

Vundo

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Vundo, or the Vundo...

CHF 32.55

1 Anbieter

undefined, Rogue Security Software

undefined

Rogue Security Software

Rogue security software (or rogueware) is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal ...

CHF 32.55

1 Anbieter

undefined, Mathematical and Engineering Methods in Computer Science

undefined

Mathematical and Engineering Methods in Co...

Programming Support for Future Parallel Architectures.- Flexible Interpolation for Efficient Model Checking.- Understanding Transparent and Complic...

ab CHF 118.00

2 Anbieter

undefined, Evaluation of Diff. VPN Tunneling Techniques in Virtualized Datacenter

undefined

Evaluation of Diff. VPN Tunneling Techniqu...

The security of VPN mostly relies on authentication and encryption. The best tunneling protocol must be in use for achieving good results and maint...

CHF 66.65

1 Anbieter

undefined, Metasploit

undefined

Metasploit

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by ...

CHF 41.25

1 Anbieter

undefined, Cybersecurity Essentials

undefined

Cybersecurity Essentials

Introduction xixPART I SECURING THE INFRASTRUCTURE 1Chapter 1 Infrastructure Security in the Real World 3Security Challenges 3Infrastructure Securi...

ab CHF 46.90

2 Anbieter