Suggested Topics within your search.
Suggested Topics within your search.
1
by Monnappa K A,
Published 2018
Subjects: ';
“...Malware (Computer software)...”Published 2018
View fulltext via EzAccess
eBook
2
3
4
Table of Contents: ';
“...Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading...”
Get full text
Get full text
Electronic
5
6
by Kirwan, Grainne, 1978-
Published 2011
Table of Contents: ';
“... of the psychology involved? -- 5. Malware: can virus writers be psychologically profiled? -- 6. Identity theft...”Published 2011
Chapter PDFs via platform:
Electronic
7
8
9
Published 2013
Table of Contents: ';
“...Malware -- Network security -- Web security -- Attacks and defenses -- Host security....”Get full text
Electronic
10
Published 2013
Table of Contents: ';
“...Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware...”Get full text
Electronic
11
Published 2007
Table of Contents: ';
“... / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --...”View fulltext via EzAccess
Electronic
12
13
Published 2013
Table of Contents: ';
“...Cloud Investigations -- Malware -- Behavioral -- Law -- New Developments in Digital Forensics...”Get full text
Electronic
14
Published 2013
Table of Contents: ';
“...Malware, authentication and authorization -- Network security/cryptography -- Software security...”Get full text
Electronic
15
Published 2013
Table of Contents: ';
“...Security & amp; Privacy in Mobile, Sensor and Ad Hoc Networks -- Malware, Botnets and Distributed...”View fulltext via EzAccess
Electronic
16
17
by Jacobson, Douglas.
Published 2013
Table of Contents: ';
“.... Passwords under attack -- ch. 4. Email security -- ch. 5. Malware : the dark side of software -- ch. 6...”Published 2013
Distributed by publisher. Purchase or institutional license may be required for access.
Electronic
18
by Salomon, David.
Published 2010
Table of Contents: ';
“...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...”Published 2010
Get full text
Electronic
19
Published 2013
Table of Contents: ';
“... Introspection and Cloning -- System Security: Malware and Intrusions MADS: Malicious Android Applications...”Get full text
Electronic
20