Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Computer viruses"'
Refine your search
Availability
Limit to records with available items
Authors
Aquilina, James M
Blunden, Bill
Briggs, Andy
Casey, Eoghan
Erbschloe, Michael
Harley, David
Kunzru, Hari
Malin, Cameron H
Mishra, Ashish
Polk, Tim
Suarez, Daniel
Show more
Show less
Item types
English Books
Reference
Locations
3RD FLOOR, A WING
Topics
Computer networks S...
Adventure and advent...
Computer crimes - In...
Computer crimes - In...
Computer hackers
Computer networks - ...
Computer science
Computer security
Computer security - ...
Computer security - ...
Computer viruses
Computer viruses - F...
Computer viruses - H...
Computers - Access c...
Forensic sciences - ...
Linux - Handbooks, m...
Malware (Computer so...
Rootkits (Computer s...
Spyware (Computer so...
Superheroes - Fictio...
Show more
Show less
Your search returned 12 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Malware forensics : investigating and analyzing malicious code
James M. Aquilina, Eoghan Casey, Cameron H. Malin
by
Aquilina, James M
Casey, Eoghan
Malin, Cameron H
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AQU
.
2.
Malware forensics field guide for Linux systems
Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor
by
Malin, Cameron H
Aquilina, James M
Casey, Eoghan
Publication details:
Amsterdam
Elsevier
2014
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MAL
.
3.
The rootkit arsenal : escape and evasion in the dark corners of the system
Bill Blunden
by
Blunden, Bill
Publication details:
Plano, TX
Wordware Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BLU
.
4.
Transmission
Hari Kunzru
by
Kunzru, Hari
Publication details:
London
Penguin
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
823.92 KUN
.
5.
Trojans, worms, and spyware : a computer security professional's guide to malicious code
Michael Erbschloe
by
Erbschloe, Michael
Publication details:
Amsterdam ; Boston
Elsevier Butterworth Heinemann
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 ERB
.
6.
Freedom : a novel
Daniel Suarez
by
Suarez, Daniel
Publication details:
London
Quercus
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
813.6 SUA
.
7.
Virus attack
Andy Briggs
by
Briggs, Andy
Publication details:
Oxford
Oxford University Press
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
823.92 BRI
.
8.
Anti-virus tools and techniques for computer systems
W. Timothy Polk ... [et al.]
by
Polk, Tim
Publication details:
Park Ridge, N.J
Noyes Data Corp
c1995
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 POL
.
9.
AVIEN malware defense guide for the enterprise
David Harley ... [et al.] ; foreword by Robert S. Vibert
by
Harley, David
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAR
.
10.
Virus attack
Andy Briggs
by
Briggs, Andy
Publication details:
Oxford
Oxford University Press
2008
Availability:
No items available.
11.
Virus attack
Andy Briggs
by
Briggs, Andy
Publication details:
Oxford
Oxford University Press
2008
Availability:
No items available.
12.
Modern cybersecurity strategies for enterprises
/ Ashish Mishra
Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with tested and proven methods
by
Mishra, Ashish
Language:
English
Publication details:
London :
Bpb Publications
c2023
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
5.8 MIS, ..
.
Pages
Find us on the map
Powered by
Koha