Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... | | Linux (Hacking Exposed)From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...
Learn how to think like a hacker in order to secure your Linux network
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software... | | QuickTime for Java: A Developer's NotebookJava developers who need to add audio, video, or interactive media creation and playback to their applications find that QuickTime Java is a powerful toolkit, but one that's not easy to get into. This book offers the first real look at this important software with an informal, code-intensive style that lets impatient early adopters focus on... |