[PDF] computer attacks free ebooks download




View results: Search for a phrase:
ISBN Language MD5 Extension

Library Search


15 books found also search"computer attacks" in ,
ID Author(s) Title Publisher Year Pages Language Size Extension GET
1038563 Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen (auth.) SpringerBriefs in Computer Science
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures [1 ed.]
978-3-642-40645-4, 978-3-642-40646-1
Springer-Verlag Berlin Heidelberg 2013 93 English 3 Mb pdf GET
1467974 Lucas Davi, Ahmad-Reza Sadeghi (auth.) SpringerBriefs in Computer Science
Building Secure Defenses Against Code-Reuse Attacks [1 ed.]
978-3-319-25544-6, 978-3-319-25546-0
Springer International Publishing 2015 X, 74 English 2 Mb pdf GET
215676 Edward Skoudis, Tom Liston Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) [2 ed.]
0131481045, 9780131481046
Prentice Hall 2006 784 English 18 Mb chm GET
1375202 George Loukas PhD in Network Security Imperial College UK; MEng in Electrical Engineering and Computer Science NTUA Greece Cyber-Physical Attacks: A Growing Invisible Threat [1 ed.]
0128012900, 9780128012901
Butterworth-Heinemann 2015 270 English 7 Mb pdf GET
1290893 Sébastien Marcel, Mark S. Nixon, Stan Z. Li (eds.) Advances in Computer Vision and Pattern Recognition
Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks [1 ed.]
978-1-4471-6523-1, 978-1-4471-6524-8
Springer-Verlag London 2014 281 English 10 Mb pdf GET
472323 Kenneth Brancik Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks [1 ed.]
1420046594, 9781420046595, 9781420046601
2007 504 English 5 Mb pdf GET
1407983 Zhou Lu, Wenye Wang, Cliff Wang (auth.) SpringerBriefs in Computer Science
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications [1 ed.]
978-3-319-23287-4, 978-3-319-23288-1
Springer International Publishing 2015 XIII, 116 English 5 Mb pdf GET
1100700 Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui SpringerBriefs in Computer Science
Network Robustness under Large-Scale Attacks [2013 ed.]
146144859X, 9781461448594
Springer 2012 50 English 3 Mb pdf GET
961780 Qing Zhou, Long Gao, Ruifang Liu, Shuguang Cui (auth.) SpringerBriefs in Computer Science
Network Robustness under Large-Scale Attacks [1 ed.]
978-1-4614-4859-4, 978-1-4614-4860-0
Springer-Verlag New York 2013 41 English 766 kb pdf GET
1292599 Angelos Stavrou, Herbert Bos, Georgios Portokalidis (eds.) Lecture Notes in Computer Science 8688 Security and Cryptology
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings [1 ed.]
978-3-319-11378-4, 978-3-319-11379-1
Springer International Publishing 2014 490 English 17 Mb pdf GET
917318 Abhinav Srivastava, Himanshu Raj, Jonathon Giffin, Paul England (auth.), Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.) Lecture Notes in Computer Science 7462
Research in Attacks, Intrusions, and Defenses: 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings [1 ed.]
9783642333378, 3642333370, 9783642333385, 3642333389
Springer-Verlag Berlin Heidelberg 2012 400 English 10 Mb pdf GET
980691 Abhinav Srivastava, Himanshu Raj, Jonathon Giffin, Paul England (auth.), Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.) Lecture Notes in Computer Science 7462
Research in Attacks, Intrusions, and Defenses: 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings [1 ed.]
978-3-642-33337-8, 978-3-642-33338-5
Springer-Verlag Berlin Heidelberg 2012 400 English 10 Mb pdf GET
1035367 Patrick Stewin (auth.), Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright (eds.) Lecture Notes in Computer Science 8145
Research in Attacks, Intrusions, and Defenses: 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings [1 ed.]
978-3-642-41283-7, 978-3-642-41284-4
Springer-Verlag Berlin Heidelberg 2013 476 English 14 Mb pdf GET
1408256 Herbert Bos, Fabian Monrose, Gregory Blanc (eds.) Lecture Notes in Computer Science 9404
Research in Attacks, Intrusions, and Defenses: 18th International Symposium, RAID 2015, Kyoto, Japan, November 2–4, 2015, Proceedings [1 ed.]
978-3-319-26361-8, 978-3-319-26362-5
Springer International Publishing 2015 XIII, 638 English 19 Mb pdf GET
155818 Skorobogatov Sergei P. Semi-invasive attacks – A new approach to hardware security analysis University of Cambridge Computer Laboratory 2005 144 English 11 Mb pdf GET

 Lovasz, Vesztergombi.
Гущин В.Н.
Токхейм Р
Каш Ф. (Kasch)
Noga Alon, Joel H. Spencer
Heinz Luneburg
Angeniol B., Lejeune-Jalabert M.
Mumford.
Schlichenmaier M.
Угольников А.Б.
Nayfeh A.H., Chin C.-M.
Риекстыньш Э.Я. (Riekstins)
Adhemar Bultheel and Marc Van Barel (Eds.)
Andrew Russell Forsyth
Гилбарг Д., Трудингер Н.
Зорич В.А.
Cho-Ho Chu, Anthony To-Ming Lau (auth.)
Вайнберг М.М.
Дэй М.М. (Mahlon M.Day)
Колмогоров, Фомин.

gamma globulinsnuclear reactorcell cycleveterinaryapplicationsnitrogenevaluationbiophysicsenzymepublic healthdatasetcontrolweb servicesplastic deformationcoastal zonefirst orderdecentralizedhuman resourcesreactive powerhormoneshealthphospholipid bilayerfield experimentgamesbacterial artificial chromosomeleakage currentdna markerinfrared spectraartschemistrydna sequencingknowledge based systemsupply chainheat and mass transfersystematic reviewsspin polarizationhabitatstransport planningelectric potentialliquid crystalsubsistence agricultureion implantationcell proliferationcommunications technologyimage analysisuser friendlypolysaccharidesitoreturn on investment