Erweiterte Suche
Preis einschränken:


Melden Sie sich jetzt an und erhalten Sie regelmäßig Informationen über neue Produkte, Sonderangebote oder neue Gutscheine.

Mit * gekennzeichnete Felder sind Pflichtfelder.

69,54 EUR*
Details Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, ... Notes in Computer Science, Band 4064)

Detection of Intrusions and Malware, and Vulnerability Assessment Constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in ...

61,49 EUR*
Details Malware: Fighting Malicious Code (Prentice Hall Series in Computer Networking and Distributed Systems)

Malware Reveals how attackers install malicious code and how they evade detection. This title shows how you can defeat their schemes and keep your computers and network safe. It details viruses, worms, backdoors, Trojan horses, RootKits, and other ...

84,95 EUR*
Details F-Secure SAFE Internet Security - 2 Jahre / 3 Geräte

F-SECURE SAFE Internet Security. Plattform: Win, Mac, IOS, Android, Windows mobile - 2 Jahre / 3 GeräteVirenschutz Der Virenschutz schützt Sie vor Malware, die Ihre persönlichen Daten erfassen und verbreiten könnte. Um Infektionen zu verhindern ...

59,90 EUR*
Details Mac Internet Security X9 - Box - 1 Mac - 1 Jahr Laufzeit

VirusBarrier X9 Details - Lässt keine Malware wie Mac-Viren, Windows-Viren, Unix-Viren, Microsoft Word- und Excel-Makroviren, Trojanische Pferde, Würmer, Spyware, Adware, Hacking-Tools, Einwählprogramme, Keylogger und Scareware (gefälschte ...

51,31 EUR*
Details XSS Attacks: Cross Site Scripting Exploits and Defense

Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS ...

23,98 EUR*
Details Sub-Circuit Selection and Replacement Algorithms Modeled as Term Rewriting Systems

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program's function for use with contextual information. Relating this framework for obfuscation to malware detection, if a ...