Search Results for Malware analysis. - Narrowed by: COMPUTERS.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMalware$002banalysis.$0026qf$003dSUBJECT$002509Subject$002509COMPUTERS.$002509COMPUTERS.$0026ps$003d300?
2026-02-26T20:14:12Z
Practical cyber intelligence : a hands-on guide to digital forensics
ent://SD_ILS/0/SD_ILS:599262
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Author Jakobsen, Adam Tilmar, author.<br/>Preferred Shelf Number HV8079 .C65 J633 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modeling and optimization of signals using machine learning techniques
ent://SD_ILS/0/SD_ILS:599379
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Preferred Shelf Number TK5102.9 .M63 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119847717</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber security and network security
ent://SD_ILS/0/SD_ILS:597484
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Author Pramanik, Sabyasachi, editor. Samanta, Debabrata, 1987- editor. Vinay, M., editor. Guha, Abhijit, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Design and development of efficient energy systems
ent://SD_ILS/0/SD_ILS:596610
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Author Tripathi, Suman Lata, editor.<br/>Preferred Shelf Number TK7881.15 .D47 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119761785</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied incident response
ent://SD_ILS/0/SD_ILS:595744
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Author Anson, Steve.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119560302</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Wireshark for security professionals : using Wireshark and the Metasploit Framework
ent://SD_ILS/0/SD_ILS:593472
2026-02-26T20:14:12Z
2026-02-26T20:14:12Z
Author Bullock, Jessey, author. Gordon, Adam, author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183457</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>