Search Results for Computer Security - Narrowed by: Computer security. - Rootkits (Computer software) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Rootkits$002b$002528Computer$002bsoftware$002529$002509Rootkits$002b$002528Computer$002bsoftware$002529$0026ic$003dtrue$0026te$003dILS$0026ps$003d300? 2024-09-10T02:35:11Z Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-09-10T02:35:11Z 2024-09-10T02:35:11Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managed code rootkits hooking into runtime environments ent://SD_ILS/0/SD_ILS:147836 2024-09-10T02:35:11Z 2024-09-10T02:35:11Z Author&#160;Metula, Erez.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495745">http://www.sciencedirect.com/science/book/9781597495745</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>