Malicious Mobile Code

Malicious Mobile Code

Explains how viruses, Trojans, worms, browser exploits, and email and instant messaging attacks can impact Windows and its component applications and explores potential defenses and enterprise-wide protection. Original. (Intermediate)


Author
Publisher "O'Reilly Media, Inc."
Release Date
ISBN 9781565926820
Pages 522 pages
Malicious Mobile Code
Language: en
Pages: 522
Authors: Roger Grimes
Categories: Computers
Type: BOOK - Published: 2001-06 - Publisher: "O'Reilly Media, Inc."

Explains how viruses, Trojans, worms, browser exploits, and email and instant messaging attacks can impact Windows and its component applications and explores p
Mobile Computing: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 3721
Authors: Taniar, David
Categories: Computers
Type: BOOK - Published: 2008-11-30 - Publisher: IGI Global

"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile
Department of Defense Sponsored Information Security Research
Language: en
Pages: 688
Authors: Department of Defense
Categories: Computers
Type: BOOK - Published: 2007-09-11 - Publisher: John Wiley & Sons

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in or
Mobile and Ubiquitous Commerce: Advanced E-Business Methods
Language: en
Pages: 384
Authors: Head, Milena M.
Categories: Computers
Type: BOOK - Published: 2009-05-31 - Publisher: IGI Global

"This book advances the understanding of management methods, information technology, and their joint application in business processes"--Provided by publisher.
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
Language: en
Pages: 1155
Authors: Hossein Bidgoli
Categories: Business & Economics
Type: BOOK - Published: 2006-03-13 - Publisher: John Wiley & Sons

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on in
The Handbook of Mobile Middleware
Language: en
Pages: 1377
Authors: Paolo Bellavista
Categories: Computers
Type: BOOK - Published: 2016-04-19 - Publisher: CRC Press

Device miniaturization, wireless computing, and mobile communication are driving ubiquitous, pervasive, and transparent computing. Supporting these rapidly evol
Electronic Business: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 2838
Authors: Lee, In
Categories: Computers
Type: BOOK - Published: 2008-12-31 - Publisher: IGI Global

Enhances libraries worldwide through top research compilations from over 250 international authors in the field of e-business.
Computer Security Handbook
Language: en
Pages: 1224
Authors: Seymour Bosworth
Categories: Business & Economics
Type: BOOK - Published: 2002-10-16 - Publisher: John Wiley & Sons

This is the most comprehensive book on computer security on themarket, with 23 chapters and 29 Appendices covering virtually allaspects of computer security. Ch
Amazon Hacks
Language: en
Pages: 280
Authors: Paul Bausch
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: "O'Reilly Media, Inc."

Presents a collection of tips and techniques for getting the most out of Amazon.com, covering such topics as browsing and searching, community features, selling
Developer's Guide to Web Application Security
Language: en
Pages: 500
Authors: Michael Cross
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Elsevier

Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonst