| 000 | 02586nam a22005415i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-77741-2 | ||
| 003 | DE-He213 | ||
| 005 | 20251006084416.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100917s2011 xxu| s |||| 0|eng d | ||
| 020 | _a9780387777412 | ||
| 020 | _a99780387777412 | ||
| 024 | 7 |
_a10.1007/978-0-387-77741-2 _2doi |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aAycock, John. _eauthor. |
|
| 245 | 1 | 0 |
_aSpyware and Adware _h[electronic resource] / _cby John Aycock. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2011. |
|
| 300 |
_aXIV, 146 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v50 |
|
| 505 | 0 | _aPreface -- Introduction -- Getting There -- Staying There -- Keylogging -- Phoning Home -- Advertising -- Advertisement Implementation -- Tracking Users -- Conclusion -- References -- Index. | |
| 520 | _aSpyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER NETWORK ARCHITECTURES. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA PROTECTION. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aSYSTEMS AND DATA SECURITY. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET). |
| 650 | 2 | 4 | _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387777405 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v50 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-77741-2 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c59011 _d59011 |
||