A comprehensive overview of cutting-edge computer system and network security issues provides thorough coverage of software reverse engineering and explanations of how to use Bayesian analysis to implement intrusion detection systems, with step-by-step instructions on how to detect access points on a network, configure honeynets, and master computer forensics. Original. (Advanced)
Cyrus Peikari Libros


Kenne deinen Feind
- 579 páginas
- 21 horas de lectura