A comprehensive overview of cutting-edge computer system and network security issues provides thorough coverage of software reverse engineering and explanations of how to use Bayesian analysis to implement intrusion detection systems, with step-by-step instructions on how to detect access points on a network, configure honeynets, and master computer forensics. Original. (Advanced)
Cyrus Peikari Books


Kenne deinen Feind
- 579 pages
- 21 hours of reading