We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£54.87
Morgan & Claypool The Continuing Arms Race: Code-Reuse Attacks and Defenses (ACM Books)
Price data last checked 44 day(s) ago - refreshing...
Price History & Forecast
Last 47 days • 47 data points (No recent data available)
Price Distribution
Price distribution over 47 days • 3 price levels
Price Analysis
Most common price: £52 (27 days, 57.4%)
Price range: £52 - £55
Price levels: 3 different prices over 47 days
Description
Key Features
Pages Count - 304. Binding type - Perfect.
Product Specifications
- Brand
- Morgan & Claypool
- Format
- Paperback
- ASIN
- 1970001801
- Domain
- Amazon UK
- Release Date
- 28 February 2018
- Listed Since
- 28 February 2018
Barcode
No barcode data available
Similar Products You Might Like
MALicious softWARE: Omnibus
MALicious softWARE: Omnibus
Springer Cyberspace Mimic Defense - Wireless Network Security
Springer
Cyber Arms: Security in Cyberspace
CRC Press
Malware Forensics: Investigating and Analyzing Malicious Code
Syngress
Network Attacks and Defenses: A Hands-on Approach
CRC Press
Architecting Secure Software Systems
CRC Press
Proactive and Dynamic Network Defense: 74 (Advances in Information Security, 74)
Springer
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
Packt Publishing
Web Hacking Arsenal and Ethical Hacking Set
Code Clone Analysis: Research, Tools, and Practices
Android Security: Attacks and Defenses
CRC Press
Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition
Packt Publishing
Springer Binary Code Fingerprinting for Cybersecurity Book
Springer
Testing Code Security
CRC Press
Springer Advances in Cyber Security - Principles and Techniques
Springer
Secure Programming Cookbook for C & C++ (Cookbooks Ser.)
O'Reilly
Proliferation of Weapons- and Dual-Use Technologies: Diplomatic, Information, Military, and Economic Approaches (Advanced Sciences and Technologies for Security Applications)
Springer
Springer Adaptive Autonomous Secure Cyber Systems Book
Springer
Adaptive Autonomous Secure Cyber Systems
Springer
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
Springer
CryptoGraphics: Exploiting Graphics Cards For Security: 20 (Advances in Information Security, 20)
Springer
Introduction to Computer and Network Security: Navigating Shades of Gray
CRC Press