 |
|
|
|
 Malware Detection (Advances in Information Security)Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many... |  |  The Art of Computer Virus Research and DefenseSymantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly... |  |  Microsoft SQL Server 2000 High AvailabilityGet the definitive reference to maximizing the availability of your critical, SQL Server 2000-based business systems. Developed by Microsoft field consultants who create and support high availability solutions every day, this practical guide explains how to plan, design, implement, and support highly available SQL Server 2000-based systems... |
|
 Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... |  |  Software Project Management in PracticeWe often hear about software projects that are late, over budget, or unable to satisfy customer needs. Yet some organizations are able to manage project after project successfully with desired results. In this book, Pankaj Jalote looks at one such organization, Infosys... |  |  Identity Theft: A Reference Handbook (Contemporary World Issues)
A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.
• Includes a chronology of key decisions, cases, and government action in the development... |
|
|
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 |