|
|
|
|
|
Securing SCADA SystemsHow to secure systems that weren't built for security
Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security... | | XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the... | | Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |
|
|
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |