1. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: DAU [Call number: 005.82 YOU] (1).
2. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: DAU [Call number: 005.8 BRO] (1).
3. Field diagnosis of chickpea diseases and their control

by Nene, Y. L | Ghanekar, A. M | Haware, M. P | Reddy, M. V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Patancheru: International Crops Research Institute for the Semi-Arid Tropics, 1991Availability: Items available for loan: DAU [Call number: 633.37 NEN] (1).
4. Bigelow's Virus troubleshooting pocket reference

by Dunham, Ken.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2001Availability: Items available for loan: DAU [Call number: 005.84 DUN] (1).
5. Darwin's radio

by Bear, Greg.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Ballantine Books, 2003Availability: Items available for loan: DAU [Call number: 808.383 BEA] (1).
6. Identifying malicious code through reverse engineering

by Singh, Baibhav | Singh, Abhishek.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: DAU [Call number: 005.84 SIN] (1).
7. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: DAU [Call number: 005.84 AYC] (1).
8. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: DAU [Call number: 005.8 CHR] (1).
9. HIV protocols

by Prasad, Vinayaka R | Kalpana, Ganjam V.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: DAU [Call number: 616.97920072 PRA] (1).
10. Tangled Web : a guide to securing modern Web applications

by Zalewski, Michal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: DAU [Call number: 005.8 ZAL] (1).
11. Botnets : the killer web app

by Schiller, Craig A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: DAU [Call number: 005.8 SCH] (1).
12. Computer viruses : from theory to applications

by Filiol, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2009Availability: Items available for loan: DAU [Call number: 005.84 FIL] (2).
13. Stochastic modeling of AIDS epidemiology and HIV pathogenesis

by Wai-Yuan, Tan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore: World Scientific, 2000Availability: Items available for loan: DAU [Call number: 614.599392 WAI] (1).
14. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: DAU [Call number: 005.84 NAZ] (1).
15. Practical malware analysis : the hands-on guide to dissecting malicious software

by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: DAU [Call number: 005.84 SIK] (1).
16. Malware data science : attack detection and attribution

by Saxe, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: DAU [Call number: 005.88 SAX] (1).
17. x86 software reverse-engineering, cracking, and counter-measures

by Domas, Stephanie | Domas, Christopher.

Publisher: Hoboken : Wiley, 2023Availability: Items available for loan: DAU [Call number: 005.8 DOM] (1).

Powered by Koha