Beyond layers and peripheral antivirus security
A framework for deception
Artificial immunity using constraint based detectors
A fast static analysis approach to detect exploit code inside network flows
Attack of the quantum worms
Acquisition of malicious code using active learning
An analysis of how antivirus methodologies are utilized in protecting computers from malicious code
An email worm vaccine architecture
Benefits and considerations for a single vendor antivirus strategy
Automated web patrol with strider honey monkeys finding web sites that exploit browser vulnerabilities
Biological models of security for virus propagation in computer networks
Bot software spreads, causes new worries
Broadband network virus detection system based on bypass monitor
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa - 2003
Automated classification and analysis of internet malware
(2004) mcgraw hill oracle database 10 g xml and sql design build and manage xml applications in java c c ,and pl-sql
(1999) php and my sql o-reilly's - access database design & programming - second edition
[Addison wesley] undocumented windows 2000 secrets the programmers cookbook
(2001) my sql php database applications
An approach to containing computer viruses