Spyware and Adware

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware...

Full description

Bibliographic Details
Main Author: Aycock, John (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Boston, MA : Springer US, 2011.
Series:Advances in Information Security, 50
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 02589nam a22005535i 4500
001 978-0-387-77741-2
003 DE-He213
005 20151204140754.0
007 cr nn 008mamaa
008 100917s2011 xxu| s |||| 0|eng d
020 |a 9780387777412  |9 978-0-387-77741-2 
024 7 |a 10.1007/978-0-387-77741-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Aycock, John.  |e author. 
245 1 0 |a Spyware and Adware  |h [electronic resource] /  |c by John Aycock. 
264 1 |a Boston, MA :  |b Springer US,  |c 2011. 
300 |a XIV, 146 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 1568-2633 ;  |v 50 
505 0 |a Preface -- Introduction -- Getting There -- Staying There -- Keylogging -- Phoning Home -- Advertising -- Advertisement Implementation -- Tracking Users -- Conclusion -- References -- Index. 
520 |a Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry. 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387777405 
830 0 |a Advances in Information Security,  |x 1568-2633 ;  |v 50 
856 4 0 |u http://dx.doi.org/10.1007/978-0-387-77741-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)