Search Results for Malware (Computer software) - Narrowed by: Electronic Library
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMalware$002b$002528Computer$002bsoftware$002529$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026ic$003dtrue$0026ps$003d300?
2025-12-12T20:05:18Z
Explainable AI for Cybersecurity
ent://SD_ILS/0/SD_ILS:528936
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Pan, Zhixin. author. Mishra, Prabhat. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and security challenges in emerging networks
ent://SD_ILS/0/SD_ILS:481975
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Abassi, Ryma, 1980- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware diffusion models for modern complex networks : theory and applications
ent://SD_ILS/0/SD_ILS:458779
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Karyotis, Vasileios, author. Khouzani, M. H. R., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128027141">http://www.sciencedirect.com/science/book/9780128027141</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Malware forensics field guide for Windows dystems digital forensics field guides
ent://SD_ILS/0/SD_ILS:147898
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Gray hat hacking the ethical hacker's handbook
ent://SD_ILS/0/SD_ILS:293255
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mobile application security
ent://SD_ILS/0/SD_ILS:293312
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
ent://SD_ILS/0/SD_ILS:293397
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Davis, Michael A. Bodmer, Sean. LeMasters, Aaron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/hacking-exposed-malware-rootkits">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Seven deadliest social network attacks
ent://SD_ILS/0/SD_ILS:149145
2025-12-12T20:05:18Z
2025-12-12T20:05:18Z
Author Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>