Search Results for Computer security - Narrowed by: Malware (Computer software) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Malware$002b$002528Computer$002bsoftware$002529$002509Malware$002b$002528Computer$002bsoftware$002529$0026te$003dILS$0026ps$003d300?dt=list 2024-12-23T08:53:05Z Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-12-23T08:53:05Z 2024-12-23T08:53:05Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-12-23T08:53:05Z 2024-12-23T08:53:05Z Author&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-12-23T08:53:05Z 2024-12-23T08:53:05Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-12-23T08:53:05Z 2024-12-23T08:53:05Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-12-23T08:53:05Z 2024-12-23T08:53:05Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>