BOOKS - Cyber Malware Offensive and Defensive Systems
Cyber Malware Offensive and Defensive Systems - Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag 2024 PDF | EPUB Springer BOOKS
ECO~15 kg CO²

1 TON

Views
77465

Telegram
 
Cyber Malware Offensive and Defensive Systems
Author: Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag
Year: 2024
Pages: 310
Format: PDF | EPUB
File size: 24.7 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Cyber Security and Business Analysis An essential guide to secure and robust systems
Blockchain for Cybersecurity in Cyber-Physical Systems (Advances in Information Security, 102)
Advances in Ubiquitous Computing Cyber-Physical Systems, Smart Cities and Ecological Monitoring
A Practical Guide on Security and Privacy in Cyber-Physical Systems Foundations, Applications and Limitations
A Practical Guide on Security and Privacy in Cyber-Physical Systems Foundations, Applications and Limitations
Embedded System Interfacing Design for the Internet-of-Things (IoT) and Cyber-Physical Systems (CPS)
Industrial Internet of Things and Cyber-Physical Systems Transforming the Conventional to Digital (Advances in Computer and Electrical Engineering)
Practical Guide On Security And Privacy In Cyber-physical Systems, A: Foundations, Applications And Limitations (World Scientific Series In Digital Forensics And Cybersecurity)
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Advances in Engineering and Information Science Toward Smart City and Beyond (Engineering Cyber-Physical Systems and Critical Infrastructures, 5)
The Information Systems Security Officer|s Guide Establishing and Managing a Cyber Security Program, 3rd Edition
Intelligent Systems Modeling and Simulation III Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security
Introduction To Cyber Forensic Psychology Understanding The Mind Of The Cyber Deviant Perpetrators
Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
Inside Cyber Warfare Mapping the Cyber Underworld, 3rd Edition
Countering Cyber Sabotage Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response
Combatting Cyber Terrorism A guide to understanding the cyber threat landscape and incident response planning
Combatting Cyber Terrorism A guide to understanding the cyber threat landscape and incident response planning
Collaborative Cyber Threat Intelligence Detecting and Responding to Advanced Cyber Attacks on National Level
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
Cyber Victimology Decoding Cyber Crime Victimization
Cyber Enigma Unravelling the Terror in the Cyber World
Cyber Security Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Machine Learning for Computer and Cyber Security Principle, Algorithms, and Practices (Cyber Ecosystem and Security)
Cyber Security Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Security and Digital Forensics: Challenges and Future Trends (Advances in Cyber Security)
System Architecture and Complexity Contribution of Systems of Systems to Systems Thinking
Defensive Mindset
Malware (Bastion Academy #2)
Practical Malware Analysis
On the Defensive (Ryan Kaine #3)
Defensive Pistol Fundamentals
Dating the Defensive Back
Hacking Exposed Malware and Rootkits
Malware Blues (Battlecruiser Alamo, #16)
Malware Handbook of Prevention and Detection
Machine Learning under Malware Attack