Search Results for - Narrowed by: Sécurité informatique. - Debugging in computer science.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Debugging$002bin$002bcomputer$002bscience.$002509Debugging$002bin$002bcomputer$002bscience.$0026ps$003d300?
2024-06-09T21:55:03Z
Malware data science : attack detection and attribution
ent://SD_ILS/0/SD_ILS:2317388
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>
Windows virus and malware troubleshooting
ent://SD_ILS/0/SD_ILS:2312937
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>
Practical malware analysis : the hands-on guide to dissecting malicious software
ent://SD_ILS/0/SD_ILS:2295152
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>
A bug hunter's diary : a guided tour through the wilds of software security
ent://SD_ILS/0/SD_ILS:2293946
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>
Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebt
ent://SD_ILS/0/SD_ILS:2297743
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>
Secure programming with static analysis
ent://SD_ILS/0/SD_ILS:2283448
2024-06-09T21:55:03Z
2024-06-09T21:55:03Z
by Chess, Brian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar">https://go.oreilly.com/library-access/library/view/-/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778/?ar">https://learning.oreilly.com/library/view/~/9780321424778/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780321424778">https://learning.oreilly.com/library/view/~/9780321424778</a><br/>Format: Electronic Resources<br/>