|
1.
|
Malicious cryptography : exposing cryptovirology
by Young, Adam | Yung, Moti. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
|
|
2.
|
Disruptive security technologies with mobile code and peer to peer networks
by Brooks, Richard R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
|
|
3.
|
Identifying malicious code through reverse engineering
by Singh, Baibhav | Singh, Abhishek. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).
|
|
4.
|
Computer viruses and malware
by Aycock, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
|
|
5.
|
Malware detection
by Mihai, Christodorescu. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
|
|
6.
|
Botnets : the killer web app
by Schiller, Craig A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
|
|
7.
|
Computer viruses : from theory to applications
by Filiol, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 005.84 FIL] (2).
|
|
8.
|
Defense and detection strategies against Internet worms
by Nazario, Jose. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
|
|
9.
|
Practical malware analysis : the hands-on guide to dissecting malicious software
by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.84 SIK] (1).
|
|
10.
|
Malware data science : attack detection and attribution
by Saxe, Joshua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).
|