Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming proble
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, pa
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible t
Windows 2000 Secrets is the ultimate resource guide for accessing hidden techniques and undocumented features within Windows 2000. With over 800 pages, plus a b