[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa - 2003 Backdoors et rootkits_avancees_[slides] Automatic comparison of malware Automated defense from rootkit attacks Autoimmune computer virus Attack of the quantum worms Applications of immune system computing Api win32 ancestrales pour chevaux de troie hyper furtifs Anti virus product evaluation in the real world Antivirus update reaction times of major antivirus vendors Analysis of web application worms and viruses A survey of cryptologic issues in computer virology 01 le 10 regole dell'hacking 00 the big guide sz (by dr.to-d) [Ebook ita - database] access 2000 manuale (Ebook computer - ita - pdf) fondamenti di informatica - teoria (Ebook ita - inform - access) guida al database access (doc) (E book) cracking & hacking tutorial 1000 pagine (ita) Broadband network virus detection system based on bypass monitor Blended attacks exploits, vulnerabilities and buffer overflow techniques in computer viruses Bot software spreads, causes new worries Bird binary interpretation using runtime disassembly Biologically inspired defenses against computer viruses