Contents
Academic literature on the topic 'Browser Hijacking Software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Browser Hijacking Software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Browser Hijacking Software"
Pan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.
Full textOseni, Rayhanat Olatundun, and Abdul-Quadri Olayinka Oseni. "Data Security: Data Breach by Free Websites and Applications." Recent Trends in Information Technology and its Application 2, no. 3 (2019): 1–9. https://doi.org/10.5281/zenodo.3529369.
Full textLYSENKO, S., V. OMELIANENKO, and R. SHCHUKA. "METHOD FOR THE SPYWARE IDENTIFICATION IN THE COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 285, no. 3 (2020): 43–49. https://doi.org/10.31891/2307-5732-2020-285-3-7.
Full text"Assessment of Security Issues in Cloud Computing." International Journal of Recent Technology and Engineering 8, no. 2S8 (2019): 991–93. http://dx.doi.org/10.35940/ijrte.b1189.0882s819.
Full text"Assessment of Security Issues in Cloud Computing." International Journal of Engineering and Advanced Technology 8, no. 6S (2019): 437–39. http://dx.doi.org/10.35940/ijeat.f1093.0886s19.
Full textBook chapters on the topic "Browser Hijacking Software"
Alexander, Paulette S. "Unsolicited Web Intrusions." In Personal Web Usage in the Workplace. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-148-3.ch007.
Full text"Web Server Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch008.
Full text