Search Results for Computer Security - Narrowed by: Computer security. - Computer viruses. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bviruses.$002509Computer$002bviruses.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-09-10T02:27:35Z Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-09-10T02:27:35Z 2024-09-10T02:27:35Z Author&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest Microsoft attacks ent://SD_ILS/0/SD_ILS:149018 2024-09-10T02:27:35Z 2024-09-10T02:27:35Z Author&#160;Kraus, Rob.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495516">http://www.sciencedirect.com/science/book/9781597495516</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Buffer overflow attacks detect, exploit, prevent ent://SD_ILS/0/SD_ILS:254023 2024-09-10T02:27:35Z 2024-09-10T02:27:35Z Author&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266672">http://www.sciencedirect.com/science/book/9781932266672</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>