(Išleidimo metai: 30-Sep-2024, PDF+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781040100141)
When Grandpas computer falls victim to malware, its up to Zuri to save the day! Using an engaging story with beautiful illustrations, this picture book makes it easy to introduce your child or student to basic computer science concepts and vocabula...Daugiau...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Daugiau...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Daugiau...
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabil...Daugiau...
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabil...Daugiau...
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
Serija: Security, Privacy, and Trust in Mobile Communications
(Išleidimo metai: 30-Dec-2022, EPUB+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781000824988)
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protectin...Daugiau...
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
Serija: Security, Privacy, and Trust in Mobile Communications
(Išleidimo metai: 30-Dec-2022, PDF+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781000824971)
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protectin...Daugiau...
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your acti...Daugiau...
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your acti...Daugiau...
(Išleidimo metai: 14-Sep-2021, EPUB+DRM, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781119849131)
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And its growing longer every day. In Ransomware Pr...Daugiau...
(Išleidimo metai: 14-Sep-2021, PDF+DRM, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781119850014)
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And its growing longer every day. In Ransomware Pr...Daugiau...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common...Daugiau...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common...Daugiau...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind...Daugiau...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind...Daugiau...
(Išleidimo metai: 18-Feb-2021, EPUB+DRM, Leidėjas: IT Governance Publishing, ISBN-13: 9781787782808)
The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a wh...Daugiau...
(Išleidimo metai: 18-Feb-2021, PDF+DRM, Leidėjas: IT Governance Publishing, ISBN-13: 9781787782792)
The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a wh...Daugiau...
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these tec...Daugiau...