1
by Monnappa K A,
Published 2018
Subjects: '; ...Malware (Computer software)...
View fulltext via EzAccess
eBook
2
3
by Mohanta, Abhijit,, Saldanha, Anoop,
Published 2020
Subjects: '; ...Malware (Computer software)...
View fulltext via EzAccess
eBook
4
by Jiang, Xuxian., Zhou, Yajin.
Published 2013
Table of Contents: '; ...Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading...
Get full text
Electronic
5
by Yin, Heng., Song, Dawn.
Published 2013
Get full text
Electronic
6
by Kirwan, Grainne, 1978-
Published 2011
Table of Contents: '; ... of the psychology involved? -- 5. Malware: can virus writers be psychologically profiled? -- 6. Identity theft...
Chapter PDFs via platform:
Electronic
7
8
9
Published 2013
Table of Contents: '; ...Malware -- Network security -- Web security -- Attacks and defenses -- Host security....
Get full text
Electronic
10
Published 2013
Table of Contents: '; ...Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware...
Get full text
Electronic
11
Published 2007
Table of Contents: '; ... / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --...
View fulltext via EzAccess
Electronic
12
Get full text
Electronic
13
Published 2013
Table of Contents: '; ...Cloud Investigations -- Malware -- Behavioral -- Law -- New Developments in Digital Forensics...
Get full text
Electronic
14
Published 2013
Table of Contents: '; ...Malware, authentication and authorization -- Network security/cryptography -- Software security...
Get full text
Electronic
15
Published 2013
Table of Contents: '; ...Security & amp; Privacy in Mobile, Sensor and Ad Hoc Networks -- Malware, Botnets and Distributed...
View fulltext via EzAccess
Electronic
16
by Thakur, Kutub.
Published 2020
View fulltext via EzAccess
Electronic
17
by Jacobson, Douglas.
Published 2013
Table of Contents: '; .... Passwords under attack -- ch. 4. Email security -- ch. 5. Malware : the dark side of software -- ch. 6...
Distributed by publisher. Purchase or institutional license may be required for access.
Electronic
18
by Salomon, David.
Published 2010
Table of Contents: '; ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...
Get full text
Electronic
19
Published 2013
Table of Contents: '; ... Introspection and Cloning -- System Security: Malware and Intrusions MADS: Malicious Android Applications...
Get full text
Electronic
20