Your search returned 12 results.

Sort
Results
1.
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

2.
Malware forensics field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor by
Publication details: Amsterdam Elsevier 2014
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MAL.

3.
The rootkit arsenal : escape and evasion in the dark corners of the system Bill Blunden by
Publication details: Plano, TX Wordware Pub c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BLU.

4.
Transmission Hari Kunzru by
Publication details: London Penguin 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 823.92 KUN.

5.
Trojans, worms, and spyware : a computer security professional's guide to malicious code Michael Erbschloe by
Publication details: Amsterdam ; Boston Elsevier Butterworth Heinemann c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 ERB.

6.
Freedom : a novel Daniel Suarez by
Publication details: London Quercus 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 813.6 SUA.

7.
Virus attack Andy Briggs by
Publication details: Oxford Oxford University Press 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 823.92 BRI.

8.
Anti-virus tools and techniques for computer systems W. Timothy Polk ... [et al.] by
Publication details: Park Ridge, N.J Noyes Data Corp c1995
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POL.

9.
AVIEN malware defense guide for the enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAR.

10.
Virus attack Andy Briggs by
Publication details: Oxford Oxford University Press 2008
Availability: No items available.

11.
Virus attack Andy Briggs by
Publication details: Oxford Oxford University Press 2008
Availability: No items available.

12.
Modern cybersecurity strategies for enterprises / Ashish Mishra Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with tested and proven methods by Language: English
Publication details: London : Bpb Publications c2023
Availability: Items available for loan: Anna Centenary Library (2)Call number: 5.8 MIS, ...

Pages

Find us on the map

Powered by Koha