Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...
Business Process Management Workshops: BPM 2009 International Workshops
This book constitutes the thoroughly refereed post-workshop proceedings of eight international workshops held in Ulm, Germany, in conjunction with the 7th International Conference on Business Process Management, BPM 2009, in September 2009. The eight workshops were on Empirical Research in Business Process Management (ER-BPM 2009), Reference...
Prediction of Protein Structures, Functions, and Interactions
The growing flood of new experimental data generated by genome sequencing has provided an impetus for the development of automated methods for predicting the functions of proteins that have been deduced by sequence analysis and lack experimental characterization.
Prediction of Protein Structures, Functions and Interactions presents...
|Result Page: 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 |