Search Results - attack ad*

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Computers under attack intruders, worms, and viruses by Denning, Peter J. 1942-

    Published 1990
  2. 2
  3. 3

    Security and policy driven computing by Liu, Lei

    Published 2011
    Table of Contents: “…Finite automata for evaluating testbed resource contention -- 7. Adaptive buffer tuning for data intensive algebraic operations -- 8. …”
  4. 4
  5. 5

    The best damn firewall book period by Shinder, Thomas W.

    Published 2007
    Table of Contents: “…User authentication -- 25. Routing -- 26. Address translation…”
  6. 6

    Globalisation, criminal law and criminal justice : theoretical, comparative and transnational perspectives by Alldridge, Peter, Cheliotis, Leonidas K. , 1977-, Mitsilegas, Valsamis , 1971-

    Published 2017
    Table of Contents: “…The interplay of criminal and administrative law in the context of market regulation: the case of serious competition infringements -- 10. …”
    Table of contents only
  7. 7

    Comprehensive analysis of parasite biology : from metabolism to drug discovery by Cerdan, Rachel, Muller, Sylke, Radulescu, Ovidiu

    Published 2016
    Table of Contents: “…Mathematical approaches to drug and target discovery. mathematical modeling and omic data integration to understand dynamic adaptation of apicomplexan parasites and identify pharmaceutical targets -- 21. …”
  8. 8

    Information security for managers by Workman, Michael D. 1957-, Gathegi, John N., Phelps, Daniel C.

    Published 2013