Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware...
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware...
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.
Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. ...
Drawing on extensive research, this book explores the techniques that old computer games used to run on tightly-constrained platforms. Retrogame developers faced incredible challenges of limited space, computing power, rudimentary tools, and the lack of homogeneous environments. Using examples from over 100 retrogames, this book examines the clever implementation tricks that game designers employed to make their creations possible, documenting these techniques that are being lost. However, these retrogame techniques have modern analogues and applications in general computer systems, not...
Drawing on extensive research, this book explores the techniques that old computer games used to run on tightly-constrained platforms. Retrogame devel...