Search Results for Malware analysis. - Narrowed by: COMPUTERS. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMalware$002banalysis.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300? 2026-02-26T20:14:12Z Practical cyber intelligence : a hands-on guide to digital forensics ent://SD_ILS/0/SD_ILS:599262 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Author&#160;Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number&#160;HV8079 .C65 J633 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modeling and optimization of signals using machine learning techniques ent://SD_ILS/0/SD_ILS:599379 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Preferred Shelf Number&#160;TK5102.9 .M63 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security and network security ent://SD_ILS/0/SD_ILS:597484 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Author&#160;Pramanik, Sabyasachi, editor.&#160;Samanta, Debabrata, 1987- editor.&#160;Vinay, M., editor.&#160;Guha, Abhijit, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Design and development of efficient energy systems ent://SD_ILS/0/SD_ILS:596610 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Author&#160;Tripathi, Suman Lata, editor.<br/>Preferred Shelf Number&#160;TK7881.15 .D47 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied incident response ent://SD_ILS/0/SD_ILS:595744 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Author&#160;Anson, Steve.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireshark for security professionals : using Wireshark and the Metasploit Framework ent://SD_ILS/0/SD_ILS:593472 2026-02-26T20:14:12Z 2026-02-26T20:14:12Z Author&#160;Bullock, Jessey, author.&#160;Gordon, Adam, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>