Linked e-resources
Details
Table of Contents
pt. 1. Understanding the dark side : malicious intent
pt. 2. Dissecting malicious behavior
pt. 3. Applying tools and methods
pt. 4. Predicting malicious behavior : tools and methods to support a paradigm shift in security.
pt. 2. Dissecting malicious behavior
pt. 3. Applying tools and methods
pt. 4. Predicting malicious behavior : tools and methods to support a paradigm shift in security.