Search Results for Malware (Computer software) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMalware$002b$002528Computer$002bsoftware$002529$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-23T10:33:32Z Artificial intelligence and security challenges in emerging networks ent://SD_ILS/0/SD_ILS:481975 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Abassi, Ryma, 1980- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:458779 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Karyotis, Vasileios, author.&#160;Khouzani, M. H. R., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128027141">http://www.sciencedirect.com/science/book/9780128027141</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacker Blackhat ent://SD_ILS/0/SD_ILS:379682 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Mann, Michael, 1943- film director, film producer.&#160;Foehl, Morgan Davis, screenwriter.&#160;Tull, Thomas, film producer.&#160;Hemsworth, Chris, actor.&#160;Davis, Viola, 1965- actor.<br/>Preferred Shelf Number&#160;PN1995.9.C66 H335 2015<br/>Electronic Access&#160;<a href="http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1">http://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1</a> <a href="http://www.mrqe.com/movie_reviews/blackhat-m100112414">http://www.mrqe.com/movie_reviews/blackhat-m100112414</a><br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~1<br/> Android malware and analysis ent://SD_ILS/0/SD_ILS:356400 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Dunham, Ken, author.&#160;Hartman, Shane, author.&#160;Morales, Jose Andre, author.&#160;Quintans, Manu, author.&#160;Strazzere, Tim, author.<br/>Preferred Shelf Number&#160;ONLINE(356400.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A&ccedil;&#305;k pencereler Open windows ent://SD_ILS/0/SD_ILS:386335 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Vigalondo, Nacho&#160;Atienza, Belen&#160;Wood, Elijah&#160;Grey, Sasha&#160;Maskell, Neil.<br/>Preferred Shelf Number&#160;PN1995.9.S87 A255 2014<br/>Format:&#160;Visual Materials<br/>Availability&#160;Beytepe Library~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking exposed malware &amp; rootkits malware &amp; rootkits security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:293397 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Davis, Michael A.&#160;Bodmer, Sean.&#160;LeMasters, Aaron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2024-12-23T10:33:32Z 2024-12-23T10:33:32Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>