Search Results for Computer software. - Narrowed by: Malware (Computer software) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Malware$002b$002528Computer$002bsoftware$002529$002509Malware$002b$002528Computer$002bsoftware$002529$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-05-25T04:57:07Z Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:458779 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Karyotis, Vasileios, author.&#160;Khouzani, M. H. R., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128027141">http://www.sciencedirect.com/science/book/9780128027141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android malware and analysis ent://SD_ILS/0/SD_ILS:356400 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Dunham, Ken, author.&#160;Hartman, Shane, author.&#160;Morales, Jose Andre, author.&#160;Quintans, Manu, author.&#160;Strazzere, Tim, author.<br/>Preferred Shelf Number&#160;ONLINE(356400.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-05-25T04:57:07Z 2024-05-25T04:57:07Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>