Spyware and adware
| Main Author: | Aycock, John (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
Springer
c2011
|
| Series: | Advances in information security
50 |
| Subjects: |
Similar Items
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003)
by: Ballard, Jason 1974-, et al.
Published: (2003)
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010)
by: Merkow, Mark S., et al.
Published: (2010)
Malware Analyst's cookbook and dvd tools and techniques for fighting malicious code
by: Ligh, Michael W., et al.
Published: (2011)
by: Ligh, Michael W., et al.
Published: (2011)
Secure software design
by: Richardson, Theodor, et al.
Published: (2013)
by: Richardson, Theodor, et al.
Published: (2013)
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012)
by: Merkow, Mark S., et al.
Published: (2012)
Hunting security bugs
by: Gallagher, Tom, et al.
Published: (2006)
by: Gallagher, Tom, et al.
Published: (2006)
Fuzzing for software security testing and quality assurance
by: Takanen, Ari, et al.
Published: (2008)
by: Takanen, Ari, et al.
Published: (2008)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Security patch management
by: Nicastro, Felicia M.
Published: (2011)
by: Nicastro, Felicia M.
Published: (2011)
Virtualization security protecting virtualized environments
by: Shackleford, Dave
Published: (2013)
by: Shackleford, Dave
Published: (2013)
Security software development assessing and managing security risks
by: Ashbaugh, Douglas A.
Published: (2009)
by: Ashbaugh, Douglas A.
Published: (2009)
Optimizing ieee 802.11i resource and security essentials for mobile and stationary devices
by: Naraei, Parisa, et al.
Published: (2015)
by: Naraei, Parisa, et al.
Published: (2015)
Reversing secrets of reverse engineering
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Software ecosystem understaning an indispensable technology and industry
by: Messerschmitt, David G., et al.
Published: (2007)
by: Messerschmitt, David G., et al.
Published: (2007)
Know all about software [ types, architecture, quality, development & engineering
by: Osborn, Temeka
Published: (2014)
by: Osborn, Temeka
Published: (2014)
Software defect prevention concepts and implementation
by: Kane, Shridhar, et al.
Published: (2003)
by: Kane, Shridhar, et al.
Published: (2003)
Fundamentals of network security
by: Canavan, John E.
Published: (2001)
by: Canavan, John E.
Published: (2001)
How to break Web software functional and security testing of Web applications and Web services
by: Andrei, Marcello, et al.
Published: (2006)
by: Andrei, Marcello, et al.
Published: (2006)
Practical PC
by: Parsons, June Jamrich, et al.
Published: (2008)
by: Parsons, June Jamrich, et al.
Published: (2008)
The practical PC
by: Parsons, June Jamrich, et al.
Published: (2006)
by: Parsons, June Jamrich, et al.
Published: (2006)
Using computers
by: Dologite, D. G. (Dorothy G.) 1941-
Published: (1987)
by: Dologite, D. G. (Dorothy G.) 1941-
Published: (1987)
Peter Norton's introduction to computers
by: Norton, Peter 1943-
Published: (1995)
by: Norton, Peter 1943-
Published: (1995)
Computers and information systems
by: Szymanski, Robert A., et al.
Published: (1995)
by: Szymanski, Robert A., et al.
Published: (1995)
Computers concepts and applications for users
by: Nickerson, Robert C. 1946-
Published: (1992)
by: Nickerson, Robert C. 1946-
Published: (1992)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
The engineering of software quality
by: O'Brien, Fergus
Published: (2004)
by: O'Brien, Fergus
Published: (2004)
Software engineering reviews and audits
by: Summers Boyd L.
Published: (2011)
by: Summers Boyd L.
Published: (2011)
Group policy fundamentals, security, and troubleshooting
by: Moskowitz, Jeremy
Published: (2008)
by: Moskowitz, Jeremy
Published: (2008)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Rigorous software development an introduction to program verification
by: Almeida, Jose Bacelar
Published: (2011)
by: Almeida, Jose Bacelar
Published: (2011)
Flexible, reliable software : using patterns and agile development
by: Christensen, Henrik B.
Published: (2010)
by: Christensen, Henrik B.
Published: (2010)
How to reduce the cost of software testing
by: Heusser, Matthew, et al.
Published: (2012)
by: Heusser, Matthew, et al.
Published: (2012)
Software testing as a service
by: Ahmed, Ashfaque
Published: (2010)
by: Ahmed, Ashfaque
Published: (2010)
Generating software from specifications
by: Waite, W. M. (William McCastline), et al.
Published: (2006)
by: Waite, W. M. (William McCastline), et al.
Published: (2006)
Agile software development : evaluating the methods for your organization
by: Koch, Alan S.
Published: (2005)
by: Koch, Alan S.
Published: (2005)
Software verification and validation for practitioners and managers
by: Rakitin, Steven R.
Published: (2001)
by: Rakitin, Steven R.
Published: (2001)
Error-free software know-how and know-why of program correctness
by: Baber, Robert Laurence
Published: (1991)
by: Baber, Robert Laurence
Published: (1991)
Software systems & applications
by: Worsham, Cassidy
Published: (2014)
by: Worsham, Cassidy
Published: (2014)
Software
Published: (1985)
Published: (1985)
Similar Items
-
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003) -
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010) -
Malware Analyst's cookbook and dvd tools and techniques for fighting malicious code
by: Ligh, Michael W., et al.
Published: (2011) -
Secure software design
by: Richardson, Theodor, et al.
Published: (2013) -
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012)