It looks like you're offline.
Open Library logo
additional options menu
Last edited anonymously
April 30, 2008 | History

Thorsten Holz

We need a photo of Thorsten Holz

5 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Virtual Honeypots: From Botnet Tracking to Intrusion Detection

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Trust and Trustworthy Computing: 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Hacking Exposed Malware & Rootkits (Hacking Exposed)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
April 30, 2008 Created by an anonymous user initial import