A comprehensive overview of cutting-edge computer system and network security issues provides thorough coverage of software reverse engineering and explanations of how to use Bayesian analysis to implement intrusion detection systems, with step-by-step instructions on how to detect access points on a network, configure honeynets, and master computer forensics. Original. (Advanced)
Cyrus Peikari Livres


Kenne deinen Feind
- 579pages
- 21 heures de lecture