Top 696 unconventional threats PDF Book Page 20

book image

Rootkits And Bootkits: Reversing Modern Malware And Next Generation Threats

Alex Matrosov, Eugene Rodionov, Sergey Bratus
·450 Pages
·2019
·15.047 MB

book image

Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security

Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot
·291 Pages
·2023
·6.847 MB

book image

Hanging By a Thread: Afghan Women’s Rights and Security Threats

Dr. Massouda Jalal, Dr. Mario Silva
·2014
·0.988 MB

book image

Threats to the Quality of Groundwater Resources: Prevention and Control

Andrea Scozzari, Elissavet Dotsika (eds.)
·326 Pages
·2016
·9.669 MB

book image

Cyber-Security Threats and Response Models in Nuclear Power Plants

Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski
·100 Pages
·2022
·1.793 MB

book image

Iran on the Brink: Rising Workers and Threats of War

Andreas Malm, Shora Esmailian
·281 Pages
·2007
·2.002 MB

book image

The Politics of the Asia-Pacific: Triumphs, Challenges, and Threats

Mark S. Williams (editor)
·381 Pages
·2022
·6.038 MB

book image

Asia-Pacific security challenges : managing black swans and persistent threats

Lin, Leo S. F.; Masys, Anthony
·310 Pages
·2018
·7.261 MB

book image

State of the World 2015: Confronting Hidden Threats to Sustainability

Worldwatch Institute (auth.)
·188 Pages
·2015
·3.854 MB

book image

Unconventional Programming Paradigms: International Workshop UPP 2004, Le Mont Saint Michel, France, September 15-17, 2004, Revised Selected and Invited Papers

Philippe Jorrand, Marie Lalire (auth.), Jean-Pierre Banâtre, Pascal Fradet, Jean-Louis Giavitto, Olivier Michel (eds.)
·370 Pages
·2005
·5.035 MB

1
192021
29
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.