Search Results for - Narrowed by: Logiciels malveillants. - Sécurité informatique.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Logiciels$002bmalveillants.$002509Logiciels$002bmalveillants.$0026qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026ps$003d300$0026isd$003dtrue?
2024-09-25T01:09:22Z
Ransomware protection playbook
ent://SD_ILS/0/SD_ILS:2330090
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>
Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.
ent://SD_ILS/0/SD_ILS:2331787
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>
Ransomware
ent://SD_ILS/0/SD_ILS:2332705
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
ent://SD_ILS/0/SD_ILS:2332411
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>
Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.
ent://SD_ILS/0/SD_ILS:2329154
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>
Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks
ent://SD_ILS/0/SD_ILS:2324609
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>
Generative malware outbreak detection
ent://SD_ILS/0/SD_ILS:2325158
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
ent://SD_ILS/0/SD_ILS:2325847
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>
Rootkits and bootkits : reversing modern malware and next generation threats
ent://SD_ILS/0/SD_ILS:2314357
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>
Getting Started with Ghidra
ent://SD_ILS/0/SD_ILS:2322605
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>
Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.
ent://SD_ILS/0/SD_ILS:2320922
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks
ent://SD_ILS/0/SD_ILS:2322400
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>
Malware data science : attack detection and attribution
ent://SD_ILS/0/SD_ILS:2317388
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>
Introduction to malware analysis for incident responders
ent://SD_ILS/0/SD_ILS:2316850
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format: Electronic Resources<br/>
Advanced malware analysis
ent://SD_ILS/0/SD_ILS:2317857
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format: Electronic Resources<br/>
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware
ent://SD_ILS/0/SD_ILS:2317050
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format: Electronic Resources<br/>
Hacking exposed : malware and rootkits : security secrets & solutions
ent://SD_ILS/0/SD_ILS:2312362
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>
Windows virus and malware troubleshooting
ent://SD_ILS/0/SD_ILS:2312937
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>
Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
ent://SD_ILS/0/SD_ILS:2308438
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>
Advanced malware analysis
ent://SD_ILS/0/SD_ILS:2308865
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a>
<a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format: Electronic Resources<br/>
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
ent://SD_ILS/0/SD_ILS:2306747
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>
Malware, rootkits & botnets : a beginner's guide
ent://SD_ILS/0/SD_ILS:2297380
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a>
<a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format: Electronic Resources<br/>
Malware forensics field guide for Windows systems : digital forensics field guides
ent://SD_ILS/0/SD_ILS:2294682
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>
Manually removing viruses and malware from Windows 7
ent://SD_ILS/0/SD_ILS:2296758
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>
Practical malware analysis : the hands-on guide to dissecting malicious software
ent://SD_ILS/0/SD_ILS:2295152
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>
A bug hunter's diary : a guided tour through the wilds of software security
ent://SD_ILS/0/SD_ILS:2293946
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code
ent://SD_ILS/0/SD_ILS:2291913
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9780470613030">https://learning.oreilly.com/library/view/~/9780470613030</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar">https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470613030/?ar">https://learning.oreilly.com/library/view/~/9780470613030/?ar</a><br/>Format: Electronic Resources<br/>
Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebt
ent://SD_ILS/0/SD_ILS:2297743
2024-09-25T01:09:22Z
2024-09-25T01:09:22Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>