![book The Art of Computer Virus Research and Defense](/covers/files_170/2774000/83812357ffad28c81d5086958e3c7251-g.jpg)
- Author: Szor Peter
- Language: English
- Year: 2005
![book The art of computer virus research and defense](/covers/files_170/2774000/cbea5c51bcec44534153f7f822970853-g.jpg)
- Author: Szor Peter
- Language: English
- Year: 2005
![book Cyber security engineering: a practical approach for systems and software assurance](/covers/files_170/2723000/58ef3da0669b2be9f770d809ac8245f3-g.jpg)
- Author: Mead Nancy R., Woody Carol C
- Language: English
- Year: 2017
![book Snort intrusion detection](/covers/files_170/2711000/2a582a07e40b998596bf838a1d152623-g.jpg)
- Author: Koziol Jack
- Language: English
- Year: 2003
![book Network anomaly detection: a machine learning perspective](/covers/files_170/2685000/cb1e2c9c26483d507211a7d8dabf1448-g.jpg)
- Author: Bhattacharyya Dhruba K
- Language: English
- Year: 2014
![book Puzzles for Hackers](/covers/files_170/2477000/b6589e6bcdd38c2eeaf551d334fe6834-d.png)
- Author: Ivan Sklyarov
- Language: English