books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 31; Issue 6
Main
Computers & Security
Volume 31; Issue 6
Computers & Security
Volume 31; Issue 6
1
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Mylonas, Alexis
,
Gritzalis, Dimitris
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 126 KB
Your tags:
english, 2012
2
Inside Cyber Warfare: Mapping the Cyber Underworld
Tsoumas, Bill
,
Gritzalis, Dimitris
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 120 KB
Your tags:
english, 2012
3
Exploiting hash functions to intensify the remote user authentication scheme
Hsieh, Wen-Bin
,
Leu, Jenq-Shiou
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 537 KB
Your tags:
english, 2012
4
Real time DDoS detection using fuzzy estimators
Shiaeles, Stavros N.
,
Katos, Vasilios
,
Karakos, Alexandros S.
,
Papadopoulos, Basil K.
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 1.66 MB
Your tags:
english, 2012
5
Engineering a secure mobile messaging framework
Castiglione, Aniello
,
Cattaneo, Giuseppe
,
Cembalo, Maurizio
,
De Santis, Alfredo
,
Faruolo, Pompeo
,
Petagna, Fabio
,
Ferraro Petrillo, Umberto
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 1.17 MB
Your tags:
english, 2012
6
Hacking: The Next Generation
Michael, Katina
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 119 KB
Your tags:
english, 2012
7
The Basics of Digital Forensics
Wedge, Tim
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 117 KB
Your tags:
english, 2012
8
Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
Khansa, Lara
,
Cook, Deborah F.
,
James, Tabitha
,
Bruyaka, Olga
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 387 KB
Your tags:
english, 2012
9
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
Fu, Anmin
,
Zhang, Yuqing
,
Zhu, Zhenchao
,
Jing, Qi
,
Feng, Jingyu
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 516 KB
Your tags:
english, 2012
10
Editorial
Spafford, Eugene H.
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 137 KB
Your tags:
english, 2012
11
Editorial Board
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 86 KB
Your tags:
english, 2012
12
Contents
Journal:
Computers & Security
Year:
2012
Language:
english
File:
PDF, 105 KB
Your tags:
english, 2012
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×