Related Books

Client-Honeypots
Language: en
Pages: 237
Authors: Jan Gerrit Göbel
Categories: Computers
Type: BOOK - Published: 2011-12-06 - Publisher: Oldenbourg Verlag

DOWNLOAD EBOOK

This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites, client-side exploits, attackers, and the
Virtual Honeypots
Language: en
Pages: 749
Authors: Niels Provos
Categories: Computers
Type: BOOK - Published: 2007-07-16 - Publisher: Pearson Education

DOWNLOAD EBOOK

Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. No
Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation
Language: en
Pages: 1375
Authors: Ephraim Nissan
Categories: Social Science
Type: BOOK - Published: 2012-06-15 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelli
Botnets
Language: en
Pages: 105
Authors: Heli Tiirmaa-Klaar
Categories: Computers
Type: BOOK - Published: 2013-06-29 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic lo
Electronic Engineering and Information Science
Language: en
Pages: 808
Authors: Dongxing Wang
Categories: Computers
Type: BOOK - Published: 2015-06-11 - Publisher: CRC Press

DOWNLOAD EBOOK

The International Conference of Electronic Engineering and Information Science 2015 (ICEEIS 2015) was held on January 17-18, 2015, Harbin, China. This proceedin