A brigadier in France, 1917-1918 / / by Brigadier Hanway Robert Cumming ; with introductions by Field-Marshall Sir William Robertson and Major-General Sir David Campbell
| A brigadier in France, 1917-1918 / / by Brigadier Hanway Robert Cumming ; with introductions by Field-Marshall Sir William Robertson and Major-General Sir David Campbell |
| Autore | Cumming Hanway Robert <1867-> |
| Pubbl/distr/stampa | [Place of publication not identified] : , : Pickle Partners Publishing, , 2013 |
| Descrizione fisica | 1 online resource (134 pages) : illustrations, maps |
| Disciplina | 940.4144 |
| Soggetto topico | World War, 1914-1918 - Campaigns - Western Front |
| ISBN | 1-78289-180-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910163205603321 |
Cumming Hanway Robert <1867->
|
||
| [Place of publication not identified] : , : Pickle Partners Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
| Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (X, 243 p. 86 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation |
| ISBN | 3-642-37300-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis. |
| Record Nr. | UNISA-996465575003316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
| Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (X, 243 p. 86 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation |
| ISBN | 3-642-37300-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis. |
| Record Nr. | UNINA-9910741165403321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||