|
|
|
|
LEADER |
02589nam a22005535i 4500 |
001 |
978-0-387-77741-2 |
003 |
DE-He213 |
005 |
20151204140754.0 |
007 |
cr nn 008mamaa |
008 |
100917s2011 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387777412
|9 978-0-387-77741-2
|
024 |
7 |
|
|a 10.1007/978-0-387-77741-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Aycock, John.
|e author.
|
245 |
1 |
0 |
|a Spyware and Adware
|h [electronic resource] /
|c by John Aycock.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2011.
|
300 |
|
|
|a XIV, 146 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 50
|
505 |
0 |
|
|a Preface -- Introduction -- Getting There -- Staying There -- Keylogging -- Phoning Home -- Advertising -- Advertisement Implementation -- Tracking Users -- Conclusion -- References -- Index.
|
520 |
|
|
|a Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387777405
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 50
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-77741-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|