Identifying malicious code through reverse engineering

Identifying malicious code through reverse engineering

book type
0 Review(s) 
LF/870074/R
English
In stock
грн95.00
грн85.50 Save 10%

  Instant download 

after payment (24/7)

  Wide range of formats 

(for all gadgets)

  Full book 

(including for Apple and Android)

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students in computer science.
LF/870074/R

Data sheet

Name of the Author
Abhishek
Singh
Language
English
ISBN
9780387098241
Release date
2009

Reviews

Write your review

Identifying malicious code through reverse engineering

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in ma...

Write your review

15 books by the same author:

Products from this category: