Search Results for - Narrowed by: Computer security. - Malware (Computer software) SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Malware$002b$002528Computer$002bsoftware$002529$002509Malware$002b$002528Computer$002bsoftware$002529$0026ps$003d300? 2024-06-01T11:23:03Z Ransomware protection playbook ent://SD_ILS/0/SD_ILS:2330090 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a> <a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format:&#160;Electronic Resources<br/> The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack ent://SD_ILS/0/SD_ILS:2333559 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks ent://SD_ILS/0/SD_ILS:2334733 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory. ent://SD_ILS/0/SD_ILS:2331787 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a> <a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware Analysis Techniques : Tricks for the Triage of Adversarial Software. ent://SD_ILS/0/SD_ILS:2329154 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware ent://SD_ILS/0/SD_ILS:2325847 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a> <a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks ent://SD_ILS/0/SD_ILS:2324609 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks ent://SD_ILS/0/SD_ILS:2322400 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format:&#160;Electronic Resources<br/> Rootkits and bootkits : reversing modern malware and next generation threats ent://SD_ILS/0/SD_ILS:2314357 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware analysis for incident responders ent://SD_ILS/0/SD_ILS:2316850 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2317857 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : malware and rootkits : security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2312362 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a> <a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2238641 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2308438 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2308865 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a> <a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2302388 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware, rootkits &amp; botnets : a beginner's guide ent://SD_ILS/0/SD_ILS:2297380 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a> <a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis : the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:2295152 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2052275 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:2291913 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9780470613030">https://learning.oreilly.com/library/view/~/9780470613030</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar">https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470613030/?ar">https://learning.oreilly.com/library/view/~/9780470613030/?ar</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary : a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2293946 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format:&#160;Electronic Resources<br/> Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufsp&uuml;rt und behebt ent://SD_ILS/0/SD_ILS:2297743 2024-06-01T11:23:03Z 2024-06-01T11:23:03Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format:&#160;Electronic Resources<br/>