(Ilmumisaeg: 30-Sep-2024, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781040100141)
When Grandpas computer falls victim to malware, its up to Zuri to save the day! Using an engaging story with beautiful illustrations, this picture book makes it easy to introduce your child or student to basic computer science concepts and vocabula...Loe edasi...
Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag, Nick Ayres
Sari: Security Informatics and Law Enforcement
(Ilmumisaeg: 08-Nov-2023, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031349690)
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Loe edasi...
Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag, Nick Ayres
Sari: Security Informatics and Law Enforcement
(Ilmumisaeg: 08-Nov-2023, EPUB+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031349690)
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Loe edasi...
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabil...Loe edasi...
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabil...Loe edasi...
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
Sari: Security, Privacy, and Trust in Mobile Communications
(Ilmumisaeg: 30-Dec-2022, EPUB+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781000824988)
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protectin...Loe edasi...
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
Sari: Security, Privacy, and Trust in Mobile Communications
(Ilmumisaeg: 30-Dec-2022, PDF+DRM, Kirjastus: Taylor & Francis Ltd, ISBN-13: 9781000824971)
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protectin...Loe edasi...
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your acti...Loe edasi...
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your acti...Loe edasi...
(Ilmumisaeg: 14-Sep-2021, EPUB+DRM, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781119849131)
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And its growing longer every day. In Ransomware Pr...Loe edasi...
(Ilmumisaeg: 14-Sep-2021, PDF+DRM, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781119850014)
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And its growing longer every day. In Ransomware Pr...Loe edasi...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common...Loe edasi...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common...Loe edasi...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind...Loe edasi...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind...Loe edasi...
(Ilmumisaeg: 18-Feb-2021, EPUB+DRM, Kirjastus: IT Governance Publishing, ISBN-13: 9781787782808)
The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a wh...Loe edasi...
(Ilmumisaeg: 18-Feb-2021, PDF+DRM, Kirjastus: IT Governance Publishing, ISBN-13: 9781787782792)
The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a wh...Loe edasi...
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these tec...Loe edasi...