Account
Orders
Advanced search
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book.The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation...
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with...
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embeddedJava security. It is compared with the security model of theJava 2 Standard Edition in order...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers