Search Results for - Narrowed by: Computer security. - Malware (Computer software)SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Malware$002b$002528Computer$002bsoftware$002529$002509Malware$002b$002528Computer$002bsoftware$002529$0026ps$003d300?2024-06-01T11:23:03ZRansomware protection playbookent://SD_ILS/0/SD_ILS:23300902024-06-01T11:23:03Z2024-06-01T11:23:03Zby Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attackent://SD_ILS/0/SD_ILS:23335592024-06-01T11:23:03Z2024-06-01T11:23:03Zby Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacksent://SD_ILS/0/SD_ILS:23347332024-06-01T11:23:03Z2024-06-01T11:23:03Zby Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112024-06-01T11:23:03Z2024-06-01T11:23:03Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>Ransomwareent://SD_ILS/0/SD_ILS:23327052024-06-01T11:23:03Z2024-06-01T11:23:03Zby Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.ent://SD_ILS/0/SD_ILS:23317872024-06-01T11:23:03Z2024-06-01T11:23:03Zby Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542024-06-01T11:23:03Z2024-06-01T11:23:03Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malwareent://SD_ILS/0/SD_ILS:23258472024-06-01T11:23:03Z2024-06-01T11:23:03Zby Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>Generative malware outbreak detectionent://SD_ILS/0/SD_ILS:23251582024-06-01T11:23:03Z2024-06-01T11:23:03Zby Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacksent://SD_ILS/0/SD_ILS:23246092024-06-01T11:23:03Z2024-06-01T11:23:03Zby Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.ent://SD_ILS/0/SD_ILS:23209222024-06-01T11:23:03Z2024-06-01T11:23:03Zby Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacksent://SD_ILS/0/SD_ILS:23224002024-06-01T11:23:03Z2024-06-01T11:23:03Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>Rootkits and bootkits : reversing modern malware and next generation threatsent://SD_ILS/0/SD_ILS:23143572024-06-01T11:23:03Z2024-06-01T11:23:03Zby Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052024-06-01T11:23:03Z2024-06-01T11:23:03Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>Introduction to malware analysis for incident respondersent://SD_ILS/0/SD_ILS:23168502024-06-01T11:23:03Z2024-06-01T11:23:03Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23178572024-06-01T11:23:03Z2024-06-01T11:23:03Zby Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format: Electronic Resources<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:23170502024-06-01T11:23:03Z2024-06-01T11:23:03Zby K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882024-06-01T11:23:03Z2024-06-01T11:23:03Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>Hacking exposed : malware and rootkits : security secrets & solutionsent://SD_ILS/0/SD_ILS:23123622024-06-01T11:23:03Z2024-06-01T11:23:03Zby Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372024-06-01T11:23:03Z2024-06-01T11:23:03Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:22386412024-06-01T11:23:03Z2024-06-01T11:23:03Zby Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382024-06-01T11:23:03Z2024-06-01T11:23:03Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23088652024-06-01T11:23:03Z2024-06-01T11:23:03Zby Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a>
<a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882024-06-01T11:23:03Z2024-06-01T11:23:03Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472024-06-01T11:23:03Z2024-06-01T11:23:03Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Malware, rootkits & botnets : a beginner's guideent://SD_ILS/0/SD_ILS:22973802024-06-01T11:23:03Z2024-06-01T11:23:03Zby Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a>
<a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582024-06-01T11:23:03Z2024-06-01T11:23:03Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382024-06-01T11:23:03Z2024-06-01T11:23:03Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Practical malware analysis : the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:22951522024-06-01T11:23:03Z2024-06-01T11:23:03Zby Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822024-06-01T11:23:03Z2024-06-01T11:23:03Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:20522752024-06-01T11:23:03Z2024-06-01T11:23:03Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format: Electronic Resources<br/>Malware analyst's cookbook and DVD : tools and techniques for fighting malicious codeent://SD_ILS/0/SD_ILS:22919132024-06-01T11:23:03Z2024-06-01T11:23:03Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9780470613030">https://learning.oreilly.com/library/view/~/9780470613030</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar">https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470613030/?ar">https://learning.oreilly.com/library/view/~/9780470613030/?ar</a><br/>Format: Electronic Resources<br/>A bug hunter's diary : a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:22939462024-06-01T11:23:03Z2024-06-01T11:23:03Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebtent://SD_ILS/0/SD_ILS:22977432024-06-01T11:23:03Z2024-06-01T11:23:03Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>