Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Our modern culture is increasingly expressed in the form of digital artifacts, yet archaeology is in its infancy when it comes to researching and understanding them. The study and reverse engineering of digital artifacts is no longer the exclusive domain of computer scientists. Presented by way of analogy to the process of archaeological fieldwork familiar to readers, the 1986 Electronic Arts game Amnesia is used as a vehicle to explain the procedure and thought process required to reverse engineer a digital artifact. As a go-to reference to learn how to begin studying the digital, Amnesia is shown to be a multi-layered artifact with a complex backstory; through it, topics in data compression, copy protection, memory management, and programming languages are covered.
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
Drawing on extensive research, this book explores the techniques that old computer games used to run on tightly-constrained platforms.
It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.
This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.