Author:
Garg Anushka,Dubey Vandana
Reference23 articles.
1. Kephart, J.O., Sorkin, G.B., Chess, D.M., White, S.R.: Fighting computer viruses. Sci. Am. 277(5), 88–93 (1997)
2. Engebretson, P.: The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy, 2nd edn, Elsevier (2013)
3. Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G., Williams, T.: Gray Hat Hacking. McGraw-Hill, New York (2011)
4. Domingues, P., Frade, M.: Digitally signed and permission restricted pdf files: a case study on digital forensics. In: ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security, Article No. 51, 27–30 Aug 2018
5. Carnevale, D.: Basic training for anti-hackers: an intensive summer program drills students on cybersecurity skills. Chronicle Higher Educ. 52(5), 41–41 (2005)