1. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
2. Disruptive security technologies with mobile code and peer to peer networks

by Brooks, Richard R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 BRO] (1).
3. Identifying malicious code through reverse engineering

by Singh, Baibhav | Singh, Abhishek.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).
4. Computer viruses and malware

by Aycock, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.84 AYC] (1).
5. Malware detection

by Mihai, Christodorescu.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 CHR] (1).
6. Botnets : the killer web app

by Schiller, Craig A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Elsevier, 2007Availability: Items available for loan: [Call number: 005.8 SCH] (1).
7. Computer viruses : from theory to applications

by Filiol, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 005.84 FIL] (2).
8. Defense and detection strategies against Internet worms

by Nazario, Jose.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston Artech House 2004Availability: Items available for loan: [Call number: 005.84 NAZ] (1).
9. Practical malware analysis : the hands-on guide to dissecting malicious software

by Sikorski, Michael | Honig, Andrew | Bejtlich, Richard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2012Availability: Items available for loan: [Call number: 005.84 SIK] (1).
10. Malware data science : attack detection and attribution

by Saxe, Joshua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco : No Starch Press, 2018Availability: Items available for loan: [Call number: 005.88 SAX] (1).

Powered by Koha