Predicting malicious behavior tools and techniques for ensuring global security /
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Indianapolis :
John Wiley & Sons,
2012.
|
Putanga: | 1st ed. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- pt. 1. Understanding the dark side : malicious intent
- pt. 2. Dissecting malicious behavior
- pt. 3. Applying tools and methods
- pt. 4. Predicting malicious behavior : tools and methods to support a paradigm shift in security.