Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
"This book is a collection of several very useful contributions. The introductory paper by the editors is quite useful as an overview of the field, and could very well be recommended reading for a course. ... I recommend this book to anyone who is involved in, or wants to get up to speed with the use of, visualization techniques in computer security." (Stefano Zanero, ACM Computing Reviews, October, 2008)