Michael Ligh, Steven Adai...
A computer forensics "how-to" for fighting malicious code...
John Aycock
It also looks at the application of malicious software to...
-
Michael Seese, Kimberly W...
-
Eoghan Casey, Cameron H. ...
Covers the field of 'live forensics', where investigators...
Paul Piccard
Focuses on defending enterprise networks from sophisticat...
John Aycock
It also looks at the application of malicious software to...
Walter Fumy, Joerg Sauerbrey
Addressing IT managers and staff, as well as CIOs and oth...
-
Peter Szor
Written by one of the best virus analysts in the world, t...
Peter H. Gregory
Viruses sneak in, usually through e-mail.
Adam Young, Moti Yung
This title describes recent discoveries on how to design ...
Mark Pearce
For Visual Studio 2003
Stuart Anderson, Sandro B...
This book constitutes the refereed proceedings of the 21s...
Roger Grimes
This text provides the strategies, tips and tricks needed...
Gilbert Held
Find out about TCP/IP--based network attack methods and t...
Syngress
Deals with specific e-mail clients, server environments, ...