Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.