|
|
|
|
|
| | Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... | | |
|
|
Python Game Programming by Example
A pragmatic guide for developing your own games with Python
About This Book
-
Strengthen your fundamentals of game programming with Python language
-
Seven hands-on games to create 2D and 3D games rapidly from scratch
-
Illustrative guide to explore the different GUI libraries...
| | Knowledge Based Radar Detection, Tracking and ClassificationThis book brings together the key concepts essential for the application of Knowledge Based Systems (KBS) to radar detection, tracking, classification, and scheduling. It highlights the latest advances in the field and forecasts the impact of KB technology on future systems, including civilian, military, and homeland defense applications.... | | BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer ... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |