The book is currently out of stock

More about the book
A comprehensive overview of cutting-edge computer system and network security issues provides thorough coverage of software reverse engineering and explanations of how to use Bayesian analysis to implement intrusion detection systems, with step-by-step instructions on how to detect access points on a network, configure honeynets, and master computer forensics. Original. (Advanced)
Book purchase
Security warrior, Cyrus Peikari
- Language
- Released
- 2004
- product-detail.submit-box.info.binding
- (Paperback)
We’ll email you as soon as we track it down.
Payment methods
We’re missing your review here.