Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Detection of Intrusions and Malware, and Vulnerability AssessmentDetection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment

Thorsten Holz

Details

OL Work ID
OL16941958W

Subjects

Data encryption (Computer science)Computer networksInformation systemsComputer scienceComputer softwareComputer securityComputers, access controlMalware (computer software)Algorithm Analysis and Problem ComplexityComputers and SocietyData EncryptionManagement of Computing and Information SystemsComputer Communication NetworksInformation Systems Applications (incl.Internet)

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.