Arama Sonuçları Malware (Computer software).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dMalware$002b$002528Computer$002bsoftware$002529.$0026ps$003d300?dt=list2025-07-16T11:52:38ZMalware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:22097582025-07-16T11:52:38Z2025-07-16T11:52:38Zby Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438752">Click to View</a><br/>Format: Electronic Resources<br/>Malware analysis techniques : tricks for the triage of adversarial softwareent://SD_ILS/0/SD_ILS:23516262025-07-16T11:52:38Z2025-07-16T11:52:38Zby Barker, Dylan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640530">Click to View</a><br/>Format: Electronic Resources<br/>Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:22386412025-07-16T11:52:38Z2025-07-16T11:52:38Zby Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems digital forensics field guidesent://SD_ILS/0/SD_ILS:22057382025-07-16T11:52:38Z2025-07-16T11:52:38Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to malware analysis for incident respondersent://SD_ILS/0/SD_ILS:23168502025-07-16T11:52:38Z2025-07-16T11:52:38Zby Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23178572025-07-16T11:52:38Z2025-07-16T11:52:38Zby Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format: Electronic Resources<br/>Introduction to malwareent://SD_ILS/0/SD_ILS:23338592025-07-16T11:52:38Z2025-07-16T11:52:38Zby Assemble You, publisher.<br/><a href="https://go.oreilly.com/library-access/library/view/-/125050AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125050AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125050AYPOD/?ar">https://learning.oreilly.com/library/view/~/125050AYPOD/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/125050AYPOD">https://learning.oreilly.com/library/view/~/125050AYPOD</a><br/>Format: Sound recording<br/>Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malwareent://SD_ILS/0/SD_ILS:23170502025-07-16T11:52:38Z2025-07-16T11:52:38Zby K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format: Electronic Resources<br/>Windows virus and malware troubleshootingent://SD_ILS/0/SD_ILS:23129372025-07-16T11:52:38Z2025-07-16T11:52:38Zby Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format: Electronic Resources<br/>Malware diffusion models for modern complex networks : theory and applicationsent://SD_ILS/0/SD_ILS:23138692025-07-16T11:52:38Z2025-07-16T11:52:38Zby Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format: Electronic Resources<br/>Advanced malware analysisent://SD_ILS/0/SD_ILS:23088652025-07-16T11:52:38Z2025-07-16T11:52:38Zby Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a>
<a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format: Electronic Resources<br/>Manually removing viruses and malware from Windows 7ent://SD_ILS/0/SD_ILS:22967582025-07-16T11:52:38Z2025-07-16T11:52:38Zby Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format: Electronic Resources<br/>Ransomware & cyber extortion : response and preventionent://SD_ILS/0/SD_ILS:23347622025-07-16T11:52:38Z2025-07-16T11:52:38Zby Davidoff, Sherri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137450268">https://learning.oreilly.com/library/view/~/9780137450268</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780137450268/?ar">https://go.oreilly.com/library-access/library/view/-/9780137450268/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137450268/?ar">https://learning.oreilly.com/library/view/~/9780137450268/?ar</a><br/>Format: Electronic Resources<br/>Malware Analysis Techniques : Tricks for the Triage of Adversarial Software.ent://SD_ILS/0/SD_ILS:23291542025-07-16T11:52:38Z2025-07-16T11:52:38Zby Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format: Electronic Resources<br/>Cuckoo Malware Analysis.ent://SD_ILS/0/SD_ILS:23005612025-07-16T11:52:38Z2025-07-16T11:52:38Zby Oktavianto, Digit.<br/><a href="https://learning.oreilly.com/library/view/~/9781782169239/?ar">https://learning.oreilly.com/library/view/~/9781782169239/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar">https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar</a><br/>Format: Electronic Resources<br/>Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacksent://SD_ILS/0/SD_ILS:23224002025-07-16T11:52:38Z2025-07-16T11:52:38Zby Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format: Electronic Resources<br/>Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through thement://SD_ILS/0/SD_ILS:23324112025-07-16T11:52:38Z2025-07-16T11:52:38Zby Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format: Electronic Resources<br/>Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacksent://SD_ILS/0/SD_ILS:23347332025-07-16T11:52:38Z2025-07-16T11:52:38Zby Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format: Electronic Resources<br/>Malware data science : attack detection and attributionent://SD_ILS/0/SD_ILS:23173882025-07-16T11:52:38Z2025-07-16T11:52:38Zby Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822025-07-16T11:52:38Z2025-07-16T11:52:38Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Practical malware analysis : the hands-on guide to dissecting malicious softwareent://SD_ILS/0/SD_ILS:22951522025-07-16T11:52:38Z2025-07-16T11:52:38Zby Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format: Electronic Resources<br/>Malware analyst's cookbook and DVD : tools and techniques for fighting malicious codeent://SD_ILS/0/SD_ILS:22919132025-07-16T11:52:38Z2025-07-16T11:52:38Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9780470613030">https://learning.oreilly.com/library/view/~/9780470613030</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar">https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470613030/?ar">https://learning.oreilly.com/library/view/~/9780470613030/?ar</a><br/>Format: Electronic Resources<br/>Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.ent://SD_ILS/0/SD_ILS:23317872025-07-16T11:52:38Z2025-07-16T11:52:38Zby Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a>
<a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format: Electronic Resources<br/>Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malwareent://SD_ILS/0/SD_ILS:23258472025-07-16T11:52:38Z2025-07-16T11:52:38Zby Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a>
<a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format: Electronic Resources<br/>Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.ent://SD_ILS/0/SD_ILS:23209222025-07-16T11:52:38Z2025-07-16T11:52:38Zby Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a>
<a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format: Electronic Resources<br/>Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setent://SD_ILS/0/SD_ILS:23084382025-07-16T11:52:38Z2025-07-16T11:52:38Zby Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882025-07-16T11:52:38Z2025-07-16T11:52:38Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:22895522025-07-16T11:52:38Z2025-07-16T11:52:38Zby Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format: Electronic Resources<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:20977262025-07-16T11:52:38Z2025-07-16T11:52:38Zby Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888756">Click to View</a><br/>Format: Electronic Resources<br/>Cuckoo Malware Analysis.ent://SD_ILS/0/SD_ILS:12622062025-07-16T11:52:38Z2025-07-16T11:52:38Zby Oktavianto, Digit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389346">Click to View</a><br/>Format: Electronic Resources<br/>The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory.ent://SD_ILS/0/SD_ILS:12739522025-07-16T11:52:38Z2025-07-16T11:52:38Zby Hale Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1740753">Click to View</a><br/>Format: Electronic Resources<br/>Malware Analyst's Cookbook and DVD : Tools and Techniques for Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:12222262025-07-16T11:52:38Z2025-07-16T11:52:38Zby Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624374">Click to View</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:22061612025-07-16T11:52:38Z2025-07-16T11:52:38Zby Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115128">Click to View</a><br/>Format: Electronic Resources<br/>A bug hunter's diary a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:20522752025-07-16T11:52:38Z2025-07-16T11:52:38Zby Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format: Electronic Resources<br/>The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attackent://SD_ILS/0/SD_ILS:23335592025-07-16T11:52:38Z2025-07-16T11:52:38Zby Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a>
<a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacksent://SD_ILS/0/SD_ILS:23246092025-07-16T11:52:38Z2025-07-16T11:52:38Zby Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format: Electronic Resources<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:23134562025-07-16T11:52:38Z2025-07-16T11:52:38Zby Masud, Mehedy.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439854556/?ar">https://go.oreilly.com/library-access/library/view/-/9781439854556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439854556/?ar">https://learning.oreilly.com/library/view/~/9781439854556/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439854556">https://learning.oreilly.com/library/view/~/9781439854556</a><br/>Format: Electronic Resources<br/>Rootkits and bootkits : reversing modern malware and next generation threatsent://SD_ILS/0/SD_ILS:23143572025-07-16T11:52:38Z2025-07-16T11:52:38Zby Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format: Electronic Resources<br/>How to defeat advanced malware : new tools for protection and forensicsent://SD_ILS/0/SD_ILS:23059372025-07-16T11:52:38Z2025-07-16T11:52:38Zby Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format: Electronic Resources<br/>Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.ent://SD_ILS/0/SD_ILS:12555862025-07-16T11:52:38Z2025-07-16T11:52:38Zby Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format: Electronic Resources<br/>The art of Mac malware : the guide to analyzing malicious softwareent://SD_ILS/0/SD_ILS:23308702025-07-16T11:52:38Z2025-07-16T11:52:38Zby Wardle, Patrick, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130206/?ar">https://learning.oreilly.com/library/view/~/9781098130206/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098130206/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130206/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098130206">https://learning.oreilly.com/library/view/~/9781098130206</a><br/>Format: Electronic Resources<br/>Ransomware protection playbookent://SD_ILS/0/SD_ILS:23300902025-07-16T11:52:38Z2025-07-16T11:52:38Zby Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a>
<a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format: Electronic Resources<br/>Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebtent://SD_ILS/0/SD_ILS:22977432025-07-16T11:52:38Z2025-07-16T11:52:38Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format: Electronic Resources<br/>Malware, rootkits & botnets : a beginner's guideent://SD_ILS/0/SD_ILS:22973802025-07-16T11:52:38Z2025-07-16T11:52:38Zby Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a>
<a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format: Electronic Resources<br/>Modern defense in depth : an integrated approach to better web application securityent://SD_ILS/0/SD_ILS:23198732025-07-16T11:52:38Z2025-07-16T11:52:38Zby Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format: Electronic Resources<br/>Securing web applications : building a strategy for defense against malicious botsent://SD_ILS/0/SD_ILS:23192612025-07-16T11:52:38Z2025-07-16T11:52:38Zby Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a>
<a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format: Electronic Resources<br/>IoT-Hacking : Sicherheitslücken im Internet der Dinge erkennen und schliessenent://SD_ILS/0/SD_ILS:23102512025-07-16T11:52:38Z2025-07-16T11:52:38Zby Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457199752">https://learning.oreilly.com/library/view/~/9781457199752</a>
<a href="https://learning.oreilly.com/library/view/~/9781457199752/?ar">https://learning.oreilly.com/library/view/~/9781457199752/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar</a><br/>Format: Electronic Resources<br/>A bug hunter's diary : a guided tour through the wilds of software securityent://SD_ILS/0/SD_ILS:22939462025-07-16T11:52:38Z2025-07-16T11:52:38Zby Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format: Electronic Resources<br/>Big data analytics with applications in insider threat detectionent://SD_ILS/0/SD_ILS:23154632025-07-16T11:52:38Z2025-07-16T11:52:38Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar">https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781351645768/?ar">https://learning.oreilly.com/library/view/~/9781351645768/?ar</a><br/>Format: Electronic Resources<br/>Generative malware outbreak detectionent://SD_ILS/0/SD_ILS:23251582025-07-16T11:52:38Z2025-07-16T11:52:38Zby Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>Hacking exposed : malware and rootkits : security secrets & solutionsent://SD_ILS/0/SD_ILS:23123622025-07-16T11:52:38Z2025-07-16T11:52:38Zby Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a>
<a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format: Electronic Resources<br/>Getting Started with Ghidraent://SD_ILS/0/SD_ILS:23226052025-07-16T11:52:38Z2025-07-16T11:52:38Zby Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format: Electronic Resources<br/>Ransomwareent://SD_ILS/0/SD_ILS:23327052025-07-16T11:52:38Z2025-07-16T11:52:38Zby Messdaghi, Chloé, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format: Video recording<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472025-07-16T11:52:38Z2025-07-16T11:52:38Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Android malware and analysisent://SD_ILS/0/SD_ILS:23047492025-07-16T11:52:38Z2025-07-16T11:52:38Zby Dunham, Ken.<br/><a href="https://learning.oreilly.com/library/view/~/9781482252200/?ar">https://learning.oreilly.com/library/view/~/9781482252200/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781482252200/?ar">https://go.oreilly.com/library-access/library/view/-/9781482252200/?ar</a><br/>Format: Electronic Resources<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:22897182025-07-16T11:52:38Z2025-07-16T11:52:38Zby Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992025-07-16T11:52:38Z2025-07-16T11:52:38Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Computer Viruses and Malwareent://SD_ILS/0/SD_ILS:5052842025-07-16T11:52:38Z2025-07-16T11:52:38Zby Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862025-07-16T11:52:38Z2025-07-16T11:52:38Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982025-07-16T11:52:38Z2025-07-16T11:52:38Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>The Essential Guide to Home Computer Security.ent://SD_ILS/0/SD_ILS:12356562025-07-16T11:52:38Z2025-07-16T11:52:38Zby R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format: Electronic Resources<br/>Software Systems Safety.ent://SD_ILS/0/SD_ILS:12841262025-07-16T11:52:38Z2025-07-16T11:52:38Zby Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2033821">Click to View</a><br/>Format: Electronic Resources<br/>Security and software for cybercafésent://SD_ILS/0/SD_ILS:22618832025-07-16T11:52:38Z2025-07-16T11:52:38Zby Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format: Electronic Resources<br/>Malware Detectionent://SD_ILS/0/SD_ILS:5055692025-07-16T11:52:38Z2025-07-16T11:52:38Zby Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132025-07-16T11:52:38Z2025-07-16T11:52:38Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Computer Science – CACIC 2017 23rd Argentine Congress, La Plata, Argentina, October 9-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20840462025-07-16T11:52:38Z2025-07-16T11:52:38Zby De Giusti, Armando Eduardo. editor. (orcid)0000-0002-6459-3592<br/><a href="https://doi.org/10.1007/978-3-319-75214-3">https://doi.org/10.1007/978-3-319-75214-3</a><br/>Format: Electronic Resources<br/>Windows 7 Tweaks : A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7.ent://SD_ILS/0/SD_ILS:12126352025-07-16T11:52:38Z2025-07-16T11:52:38Zby Sinchak, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=484905">Click to View</a><br/>Format: Electronic Resources<br/>Hands-On Ethical Hacking and Network Defense.ent://SD_ILS/0/SD_ILS:13052332025-07-16T11:52:38Z2025-07-16T11:52:38Zby Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format: Electronic Resources<br/>CompTIA Strata Study Guide : Exams FC0-U41, FC0-U11, and FC0-U21.ent://SD_ILS/0/SD_ILS:12285362025-07-16T11:52:38Z2025-07-16T11:52:38Zby Smith, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=698007">Click to View</a><br/>Format: Electronic Resources<br/>Accidental Librarian.ent://SD_ILS/0/SD_ILS:13110012025-07-16T11:52:38Z2025-07-16T11:52:38Zby MacKellar, Pamela H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3316128">Click to View</a><br/>Format: Electronic Resources<br/>Microsoft Windows Intune 2.0 Quickstart Administration : Quickstart Administration.ent://SD_ILS/0/SD_ILS:12446172025-07-16T11:52:38Z2025-07-16T11:52:38Zby Overton, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=934515">Click to View</a><br/>Format: Electronic Resources<br/>Eleventh Hour CISSP : Study Guide.ent://SD_ILS/0/SD_ILS:12636972025-07-16T11:52:38Z2025-07-16T11:52:38Zby Conrad, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1495655">Click to View</a><br/>Format: Electronic Resources<br/>Maritime Security : An Introduction.ent://SD_ILS/0/SD_ILS:11994622025-07-16T11:52:38Z2025-07-16T11:52:38Zby McNicholas, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=365617">Click to View</a><br/>Format: Electronic Resources<br/>Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace.ent://SD_ILS/0/SD_ILS:12534902025-07-16T11:52:38Z2025-07-16T11:52:38Zby Shipley, Todd G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115158">Click to View</a><br/>Format: Electronic Resources<br/>Death of the Internet.ent://SD_ILS/0/SD_ILS:12392272025-07-16T11:52:38Z2025-07-16T11:52:38Zby Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format: Electronic Resources<br/>