Mobile Malware Attacks and Defense The Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new...
Investigating Child Exploitation: The Internet, Law and Forensic Science This work is the culmination of many years of study and work. During my undergraduate
and graduate work, my primary research interests revolved around
domestic violence, sexual assault, child abuse, and child exploitation. Feminism,
the Constitution, freedom of expression and privacy, politics, and the
dynamics of power are...
|Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |