Tomeki

Explore Books on
malware (computer software)

1-24 of 90 Books

View Worm By Mark Bowden
Cover of Worm by mark bowden

Worm

By Mark Bowden

View Big Data Analytics with Applications in Insider Threat Detection By Pallabi Parveen,Bhavani Thuraisingham,Mohammad Mehedy Masud,Latifur Khan

Big Data Analytics with Applications in Insider Threat Detection

Big Data Analytics with Applications in Insider Threat Detection

By Pallabi Parveen,Bhavani Thuraisingham,Mohammad Mehedy Masud,Latifur Khan

View Data mining tools for malware detection By Mehedy Masud

Data mining tools for malware detection

Data mining tools for malware detection

By Mehedy Masud

View Zed By Joanna Kavenna
Cover of Zed by joanna kavenna

Zed

By Joanna Kavenna

View Artificial Intelligence and Security Challenges in Emerging Networks By Ryma Abassi
Cover of Artificial Intelligence and Security Challenges in Emerging Networks by ryma abassi

Artificial Intelligence and Security Challenges in Emerging Networks

By Ryma Abassi

View Technology and the Law on the Use of Force By Jackson Maogoto

Technology and the Law on the Use of Force

Technology and the Law on the Use of Force

By Jackson Maogoto

View Android malware and analysis By Ken Dunham
Cover of Android malware and analysis by ken dunham

Android malware and analysis

By Ken Dunham

View Mastering Malware Analysis By Alexey Kleymenov,Amr Thabet
Cover of Mastering Malware Analysis by alexey kleymenov,amr thabet

Mastering Malware Analysis

By Alexey Kleymenov,Amr Thabet

View Linux Server Security By Chris Binnie
Cover of Linux Server Security by chris binnie

Linux Server Security

By Chris Binnie

View Cyberterrorism After STUXNET By Thomas M. Chen,. Strategic Studies Institute (U.S.),. Army War College (U.S.),Douglas C. Lovelace Jr.
Cover of Cyberterrorism After STUXNET by thomas m. chen,. strategic studies institute (u.s.),. army war college (u.s.),douglas c. lovelace jr.

Cyberterrorism After STUXNET

By Thomas M. Chen,. Strategic Studies Institute (U.S.),. Army War College (U.S.),Douglas C. Lovelace Jr.

View Cisco Next-Generation Security Solutions By Omar Santos,Andrae Middleton,Eric Howard,Neal Humphrey,Panos Kampanakis

Cisco Next-Generation Security Solutions

Cisco Next-Generation Security Solutions

By Omar Santos,Andrae Middleton,Eric Howard,Neal Humphrey,Panos Kampanakis

View Malware forensics By James M. Aquilina
Cover of Malware forensics by james m. aquilina

Malware forensics

By James M. Aquilina

View The Art of Memory Forensics By Andrew Case,Michael Hale Ligh,Jamie Levy,Aaron Walters
Cover of The Art of Memory Forensics by andrew case,michael hale ligh,jamie levy,aaron walters

The Art of Memory Forensics

By Andrew Case,Michael Hale Ligh,Jamie Levy,Aaron Walters

View Behold a Pale Farce By Bill Blunden,Violet Cheung

Behold a Pale Farce

Behold a Pale Farce

By Bill Blunden,Violet Cheung

View Cuckoo Malware Analysis By Digit Oktavianto,Iqbal Muhardianto

Cuckoo Malware Analysis

Cuckoo Malware Analysis

By Digit Oktavianto,Iqbal Muhardianto

View Detection of Intrusions and Malware, and Vulnerability Assessment By Sven Dietrich

Detection of Intrusions and Malware, and Vulnerability Assessment

Detection of Intrusions and Malware, and Vulnerability Assessment

By Sven Dietrich

View Spring Security 3.1 By Robert Winch,Peter Mularien
Cover of Spring Security 3.1 by robert winch,peter mularien

Spring Security 3.1

By Robert Winch,Peter Mularien

View After the flare By Deji Bryce Olukotun
Cover of After the flare by deji bryce olukotun

After the flare

By Deji Bryce Olukotun

View Honeypot Frameworks and Their Applications By Chee Keong NG,Lei Pan,Yang Xiang
Cover of Honeypot Frameworks and Their Applications by chee keong ng,lei pan,yang xiang

Honeypot Frameworks and Their Applications

By Chee Keong NG,Lei Pan,Yang Xiang

View Malware Diffusion Models for Modern Complex Networks By Vasileios Karyotis,M. H. R. Khouzani

Malware Diffusion Models for Modern Complex Networks

Malware Diffusion Models for Modern Complex Networks

By Vasileios Karyotis,M. H. R. Khouzani

View OS X Incident Response By Jaron Bradley

OS X Incident Response

OS X Incident Response

By Jaron Bradley

View How to Defeat Advanced Malware By Henry Dalziel,Simon Crosby
Cover of How to Defeat Advanced Malware by henry dalziel,simon crosby

How to Defeat Advanced Malware

By Henry Dalziel,Simon Crosby

View Practical Reverse Engineering By Bruce Dang,Alexandre Gazet,Elias Bachaalany
Cover of Practical Reverse Engineering by bruce dang,alexandre gazet,elias bachaalany

Practical Reverse Engineering

By Bruce Dang,Alexandre Gazet,Elias Bachaalany

View AVIEN malware defense guide for the Enterprise By David Harley,Ken Bechtel,Michael Blanchard,Henk K. Diemer,Andrew Lee,Igor Muttik,Bojan Zdrnja
Cover of AVIEN malware defense guide for the Enterprise by david harley,ken bechtel,michael blanchard,henk k. diemer,andrew lee,igor muttik,bojan zdrnja

AVIEN malware defense guide for the Enterprise

By David Harley,Ken Bechtel,Michael Blanchard,Henk K. Diemer,Andrew Lee,Igor Muttik,Bojan Zdrnja