Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computer Viruses: from theory to applications
  • Language: en
  • Pages: 412

Computer Viruses: from theory to applications

A precise and exhaustive description of different types of malware from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas.

Blue Note Records
  • Language: en
  • Pages: 112

Blue Note Records

  • Type: Book
  • -
  • Published: 2015
  • -
  • Publisher: Unknown

None

The Vulture Investors
  • Language: en
  • Pages: 426

The Vulture Investors

"What kinds of investors actually choose to make their living by seeking out troubled companies and becoming mired in the complexities and contentiousness of a bankruptcy or out-of-court workout?" - Hilary Rosenberg (from The Vulture Investors) Welcome to the big-time, big-stress-and big-profit-world of vulture investing. From the eleventh-hour save of Donald Trump's casinos, to the tempestuous history of Wheeling-Pittsburgh Steel, to the rocky restructuring of the massive Revco discount drugstore chain, Hilary Rosenberg takes us on a fast-moving journey through some of the major bankruptcies of the 1980s and 1990s-and brings to life the infamous, talented arbiters at the heart of their reco...

CIO
  • Language: en
  • Pages: 306

CIO

  • Type: Magazine
  • -
  • Published: 2001-05-15
  • -
  • Publisher: Unknown

None

13th National Computer Security Conference
  • Language: en
  • Pages: 400

13th National Computer Security Conference

  • Type: Book
  • -
  • Published: 1990
  • -
  • Publisher: Unknown

None

Digital Contagions
  • Language: en
  • Pages: 344

Digital Contagions

  • Categories: Art
  • Type: Book
  • -
  • Published: 2007
  • -
  • Publisher: Peter Lang

Digital Contagions is the first book to offer a comprehensive and critical analysis of the culture and history of the computer virus phenomenon. The book maps the anomalies of network culture from the angles of security concerns, the biopolitics of digital systems, and the aspirations for artificial life in software. The genealogy of network culture is approached from the standpoint of accidents that are endemic to the digital media ecology. Viruses, worms, and other software objects are not, then, seen merely from the perspective of anti-virus research or practical security concerns, but as cultural and historical expressions that traverse a non-linear field from fiction to technical media, from net art to politics of software. Jussi Parikka mobilizes an extensive array of source materials and intertwines them with an inventive new materialist cultural analysis. Digital Contagions draws from the cultural theories of Gilles Deleuze and Félix Guattari, Friedrich Kittler, and Paul Virilio, among others, and offers novel insights into historical media analysis.

Robust Control Design with MATLAB®
  • Language: en
  • Pages: 832

Robust Control Design with MATLAB®

Shows readers how to exploit the capabilities of the MATLAB® Robust Control and Control Systems Toolboxes to the fullest using practical robust control examples.

Malicious Cryptography
  • Language: en
  • Pages: 418

Malicious Cryptography

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack

Machine Learning under Malware Attack
  • Language: en
  • Pages: 134

Machine Learning under Malware Attack

Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabilities, in which they could be deceived to return preferred predictions. Therefore, carefully crafted adversarial objects may impact the trust of machine learning systems compromising the reliability of their predictions, irrespective of the field in which they are deployed. The goal of this book is to improve the understanding of adversarial attacks, particularly in the malware context, and leverage the knowledge to explore defenses against adaptive adversaries. Furthermore, to study systemic weaknesses that can improve the resilience of machine learning models.

National Security Issues in Science, Law, and Technology
  • Language: en
  • Pages: 464

National Security Issues in Science, Law, and Technology

  • Type: Book
  • -
  • Published: 2007-04-16
  • -
  • Publisher: CRC Press

Using the best scientific decision-making practices, this book introduces the concept of risk management and its application in the structure of national security decisions. It examines the acquisition and utilization of all-source intelligence and addresses reaction and prevention strategies applicable to chemical, biological, and nuclear weapons; agricultural terrorism; cyberterrorism; and other potential threats to our critical infrastructure. It discusses legal issues and illustrates the dispassionate analysis of our intelligence, law enforcement, and military operations and actions. The book also considers the redirection of our national research and laboratory system to investigate weapons we have yet to confront.