Arama Sonu&ccedil;ları Malware (Computer software). SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dMalware$002b$002528Computer$002bsoftware$002529.$0026ps$003d300?dt=list 2025-07-16T11:52:38Z Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:2209758 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware analysis techniques : tricks for the triage of adversarial software ent://SD_ILS/0/SD_ILS:2351626 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Barker, Dylan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6640530">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Windows malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2238641 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Marak, Victor, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4191257">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:2205738 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware analysis for incident responders ent://SD_ILS/0/SD_ILS:2316850 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Dion, Jason, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781789530612/?ar">https://learning.oreilly.com/videos/~/9781789530612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar">https://go.oreilly.com/library-access/library/view/-/9781789530612/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2317857 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Njenga, Munir, speaker.<br/><a href="https://learning.oreilly.com/videos/~/9781788627146/?ar">https://learning.oreilly.com/videos/~/9781788627146/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar">https://go.oreilly.com/library-access/library/view/-/9781788627146/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to malware ent://SD_ILS/0/SD_ILS:2333859 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Assemble You, publisher.<br/><a href="https://go.oreilly.com/library-access/library/view/-/125050AYPOD/?ar">https://go.oreilly.com/library-access/library/view/-/125050AYPOD/?ar</a> <a href="https://learning.oreilly.com/library/view/~/125050AYPOD/?ar">https://learning.oreilly.com/library/view/~/125050AYPOD/?ar</a> <a href="https://learning.oreilly.com/library/view/~/125050AYPOD">https://learning.oreilly.com/library/view/~/125050AYPOD</a><br/>Format:&#160;Sound recording<br/> Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:2317050 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;K. A., Monnappa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar">https://go.oreilly.com/library-access/library/view/-/9781788392501/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788392501/?ar">https://learning.oreilly.com/library/view/~/9781788392501/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows virus and malware troubleshooting ent://SD_ILS/0/SD_ILS:2312937 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Bettany, Andrew, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar">https://go.oreilly.com/library-access/library/view/-/9781484226070/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484226070/?ar">https://learning.oreilly.com/library/view/~/9781484226070/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:2313869 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027165/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027165/?ar">https://learning.oreilly.com/library/view/~/9780128027165/?ar</a><br/>Format:&#160;Electronic Resources<br/> Advanced malware analysis ent://SD_ILS/0/SD_ILS:2308865 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Elisan, Christopher C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071819756">https://learning.oreilly.com/library/view/~/9780071819756</a> <a href="https://learning.oreilly.com/library/view/~/9780071819756/?ar">https://learning.oreilly.com/library/view/~/9780071819756/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar">https://go.oreilly.com/library-access/library/view/-/9780071819756/?ar</a><br/>Format:&#160;Electronic Resources<br/> Manually removing viruses and malware from Windows 7 ent://SD_ILS/0/SD_ILS:2296758 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Halsey, Mike.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar">https://go.oreilly.com/library-access/library/view/-/9781449338053/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781449338053/?ar">https://learning.oreilly.com/videos/~/9781449338053/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware &amp; cyber extortion : response and prevention ent://SD_ILS/0/SD_ILS:2334762 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Davidoff, Sherri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780137450268">https://learning.oreilly.com/library/view/~/9780137450268</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780137450268/?ar">https://go.oreilly.com/library-access/library/view/-/9780137450268/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137450268/?ar">https://learning.oreilly.com/library/view/~/9780137450268/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware Analysis Techniques : Tricks for the Triage of Adversarial Software. ent://SD_ILS/0/SD_ILS:2329154 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Barker, Dylan.<br/><a href="https://learning.oreilly.com/library/view/~/9781839212277">https://learning.oreilly.com/library/view/~/9781839212277</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar">https://go.oreilly.com/library-access/library/view/-/9781839212277/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781839212277/?ar">https://learning.oreilly.com/library/view/~/9781839212277/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cuckoo Malware Analysis. ent://SD_ILS/0/SD_ILS:2300561 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Oktavianto, Digit.<br/><a href="https://learning.oreilly.com/library/view/~/9781782169239/?ar">https://learning.oreilly.com/library/view/~/9781782169239/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar">https://go.oreilly.com/library-access/library/view/-/9781782169239/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks ent://SD_ILS/0/SD_ILS:2322400 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Hassan, Nihad A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484242551/?ar">https://learning.oreilly.com/library/view/~/9781484242551/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar">https://go.oreilly.com/library-access/library/view/-/9781484242551/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484242551">https://learning.oreilly.com/library/view/~/9781484242551</a><br/>Format:&#160;Electronic Resources<br/> Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them ent://SD_ILS/0/SD_ILS:2332411 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Skulkin, Oleg.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442/?ar">https://learning.oreilly.com/library/view/~/9781803240442/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240442">https://learning.oreilly.com/library/view/~/9781803240442</a><br/>Format:&#160;Electronic Resources<br/> Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks ent://SD_ILS/0/SD_ILS:2334733 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Kleymenov, Alexey, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781803240244/?ar">https://learning.oreilly.com/library/view/~/9781803240244/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781803240244">https://learning.oreilly.com/library/view/~/9781803240244</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar">https://go.oreilly.com/library-access/library/view/-/9781803240244/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware data science : attack detection and attribution ent://SD_ILS/0/SD_ILS:2317388 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Saxe, Joshua, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067672">https://learning.oreilly.com/library/view/~/9781492067672</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067672/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067672/?ar">https://learning.oreilly.com/library/view/~/9781492067672/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis : the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:2295152 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Sikorski, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar">https://go.oreilly.com/library-access/library/view/-/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906/?ar">https://learning.oreilly.com/library/view/~/9781593272906/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593272906">https://learning.oreilly.com/library/view/~/9781593272906</a><br/>Format:&#160;Electronic Resources<br/> Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:2291913 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9780470613030">https://learning.oreilly.com/library/view/~/9780470613030</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar">https://go.oreilly.com/library-access/library/view/-/9780470613030/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470613030/?ar">https://learning.oreilly.com/library/view/~/9780470613030/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory. ent://SD_ILS/0/SD_ILS:2331787 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Ostrovskaya, Svetlana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781801070331">https://learning.oreilly.com/library/view/~/9781801070331</a> <a href="https://learning.oreilly.com/library/view/~/9781801070331/?ar">https://learning.oreilly.com/library/view/~/9781801070331/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar">https://go.oreilly.com/library-access/library/view/-/9781801070331/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware ent://SD_ILS/0/SD_ILS:2325847 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Mohanta, Abhijit.<br/><a href="https://learning.oreilly.com/library/view/~/9781484261934">https://learning.oreilly.com/library/view/~/9781484261934</a> <a href="https://learning.oreilly.com/library/view/~/9781484261934/?ar">https://learning.oreilly.com/library/view/~/9781484261934/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar">https://go.oreilly.com/library-access/library/view/-/9781484261934/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. ent://SD_ILS/0/SD_ILS:2320922 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Kleymenov, Alexey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar">https://go.oreilly.com/library-access/library/view/-/9781789610789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789">https://learning.oreilly.com/library/view/~/9781789610789</a> <a href="https://learning.oreilly.com/library/view/~/9781789610789/?ar">https://learning.oreilly.com/library/view/~/9781789610789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ent://SD_ILS/0/SD_ILS:2308438 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Marak, Victor, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785281518">https://learning.oreilly.com/library/view/~/9781785281518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar">https://go.oreilly.com/library-access/library/view/-/9781785281518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785281518/?ar">https://learning.oreilly.com/library/view/~/9781785281518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2302388 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:2289552 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Shema, Mike.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495431/?ar">https://learning.oreilly.com/library/view/~/9781597495431/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495431/?ar</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:2097726 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cuckoo Malware Analysis. ent://SD_ILS/0/SD_ILS:1262206 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Oktavianto, Digit.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1389346">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory. ent://SD_ILS/0/SD_ILS:1273952 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Hale Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware Analyst's Cookbook and DVD : Tools and Techniques for Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:1222226 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Ligh, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=624374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2206161 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115128">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2052275 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack ent://SD_ILS/0/SD_ILS:2333559 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Leo, Philipp, author.<br/><a href="https://learning.oreilly.com/library/view/~/53863MIT63419">https://learning.oreilly.com/library/view/~/53863MIT63419</a> <a href="https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar">https://go.oreilly.com/library-access/library/view/-/53863MIT63419/?ar</a> <a href="https://learning.oreilly.com/library/view/~/53863MIT63419/?ar">https://learning.oreilly.com/library/view/~/53863MIT63419/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks ent://SD_ILS/0/SD_ILS:2324609 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Rains, Tim, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781800206014/?ar">https://learning.oreilly.com/library/view/~/9781800206014/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800206014">https://learning.oreilly.com/library/view/~/9781800206014</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar">https://go.oreilly.com/library-access/library/view/-/9781800206014/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data mining tools for malware detection ent://SD_ILS/0/SD_ILS:2313456 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Masud, Mehedy.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439854556/?ar">https://go.oreilly.com/library-access/library/view/-/9781439854556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439854556/?ar">https://learning.oreilly.com/library/view/~/9781439854556/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439854556">https://learning.oreilly.com/library/view/~/9781439854556</a><br/>Format:&#160;Electronic Resources<br/> Rootkits and bootkits : reversing modern malware and next generation threats ent://SD_ILS/0/SD_ILS:2314357 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Matrosov, Alex, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492071259/?ar">https://learning.oreilly.com/library/view/~/9781492071259/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar">https://go.oreilly.com/library-access/library/view/-/9781492071259/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492071259">https://learning.oreilly.com/library/view/~/9781492071259</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:2305937 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Dalziel, Henry, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128027318/?ar">https://learning.oreilly.com/library/view/~/9780128027318/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128027318">https://learning.oreilly.com/library/view/~/9780128027318</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar">https://go.oreilly.com/library-access/library/view/-/9780128027318/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software. ent://SD_ILS/0/SD_ILS:1255586 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Sikorski, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The art of Mac malware : the guide to analyzing malicious software ent://SD_ILS/0/SD_ILS:2330870 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Wardle, Patrick, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098130206/?ar">https://learning.oreilly.com/library/view/~/9781098130206/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098130206/?ar">https://go.oreilly.com/library-access/library/view/-/9781098130206/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098130206">https://learning.oreilly.com/library/view/~/9781098130206</a><br/>Format:&#160;Electronic Resources<br/> Ransomware protection playbook ent://SD_ILS/0/SD_ILS:2330090 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119849124">https://learning.oreilly.com/library/view/~/9781119849124</a> <a href="https://learning.oreilly.com/library/view/~/9781119849124/?ar">https://learning.oreilly.com/library/view/~/9781119849124/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar">https://go.oreilly.com/library-access/library/view/-/9781119849124/?ar</a><br/>Format:&#160;Electronic Resources<br/> Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufsp&uuml;rt und behebt ent://SD_ILS/0/SD_ILS:2297743 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar">https://go.oreilly.com/library-access/library/view/-/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670/?ar">https://learning.oreilly.com/library/view/~/9781457169670/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457169670">https://learning.oreilly.com/library/view/~/9781457169670</a><br/>Format:&#160;Electronic Resources<br/> Malware, rootkits &amp; botnets : a beginner's guide ent://SD_ILS/0/SD_ILS:2297380 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Elisan, Christopher C.<br/><a href="https://learning.oreilly.com/library/view/~/9780071792066">https://learning.oreilly.com/library/view/~/9780071792066</a> <a href="https://learning.oreilly.com/library/view/~/9780071792066/?ar">https://learning.oreilly.com/library/view/~/9780071792066/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar">https://go.oreilly.com/library-access/library/view/-/9780071792066/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern defense in depth : an integrated approach to better web application security ent://SD_ILS/0/SD_ILS:2319873 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Gates, Stephen, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492050360/?ar">https://learning.oreilly.com/library/view/~/9781492050360/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492050360">https://learning.oreilly.com/library/view/~/9781492050360</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar">https://go.oreilly.com/library-access/library/view/-/9781492050360/?ar</a><br/>Format:&#160;Electronic Resources<br/> Securing web applications : building a strategy for defense against malicious bots ent://SD_ILS/0/SD_ILS:2319261 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Gates, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar">https://go.oreilly.com/library-access/library/view/-/9781492040279/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279">https://learning.oreilly.com/library/view/~/9781492040279</a> <a href="https://learning.oreilly.com/library/view/~/9781492040279/?ar">https://learning.oreilly.com/library/view/~/9781492040279/?ar</a><br/>Format:&#160;Electronic Resources<br/> IoT-Hacking : Sicherheitsl&uuml;cken im Internet der Dinge erkennen und schliessen ent://SD_ILS/0/SD_ILS:2310251 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Dhanjani, Nitesh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781457199752">https://learning.oreilly.com/library/view/~/9781457199752</a> <a href="https://learning.oreilly.com/library/view/~/9781457199752/?ar">https://learning.oreilly.com/library/view/~/9781457199752/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199752/?ar</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary : a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:2293946 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Klein, Tobias.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar">https://go.oreilly.com/library-access/library/view/-/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859/?ar">https://learning.oreilly.com/library/view/~/9781593273859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781593273859">https://learning.oreilly.com/library/view/~/9781593273859</a><br/>Format:&#160;Electronic Resources<br/> Big data analytics with applications in insider threat detection ent://SD_ILS/0/SD_ILS:2315463 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar">https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781351645768/?ar">https://learning.oreilly.com/library/view/~/9781351645768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Hacking exposed : malware and rootkits : security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:2312362 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Davis, Michael, 1982- author.<br/><a href="https://learning.oreilly.com/library/view/~/9780071825757">https://learning.oreilly.com/library/view/~/9780071825757</a> <a href="https://learning.oreilly.com/library/view/~/9780071825757/?ar">https://learning.oreilly.com/library/view/~/9780071825757/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar">https://go.oreilly.com/library-access/library/view/-/9780071825757/?ar</a><br/>Format:&#160;Electronic Resources<br/> Getting Started with Ghidra ent://SD_ILS/0/SD_ILS:2322605 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Messier, Ric, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar">https://go.oreilly.com/library-access/library/view/-/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265/?ar">https://learning.oreilly.com/library/view/~/9781098115265/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098115265">https://learning.oreilly.com/library/view/~/9781098115265</a><br/>Format:&#160;Electronic Resources<br/> Ransomware ent://SD_ILS/0/SD_ILS:2332705 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Messdaghi, Chlo&eacute;, presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar">https://go.oreilly.com/library-access/library/view/-/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641/?ar">https://learning.oreilly.com/videos/~/0636920702641/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920702641">https://learning.oreilly.com/videos/~/0636920702641</a><br/>Format:&#160;Video recording<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Android malware and analysis ent://SD_ILS/0/SD_ILS:2304749 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Dunham, Ken.<br/><a href="https://learning.oreilly.com/library/view/~/9781482252200/?ar">https://learning.oreilly.com/library/view/~/9781482252200/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781482252200/?ar">https://go.oreilly.com/library-access/library/view/-/9781482252200/?ar</a><br/>Format:&#160;Electronic Resources<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:2289718 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Timm, Carl.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455/?ar">https://learning.oreilly.com/library/view/~/9781597495455/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495455">https://learning.oreilly.com/library/view/~/9781597495455</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085299 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Viruses and Malware ent://SD_ILS/0/SD_ILS:505284 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Aycock, John. author.<br/><a href="http://dx.doi.org/10.1007/0-387-34188-9">http://dx.doi.org/10.1007/0-387-34188-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085186 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085198 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> The Essential Guide to Home Computer Security. ent://SD_ILS/0/SD_ILS:1235656 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;R. Rowlingson, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=811317">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software Systems Safety. ent://SD_ILS/0/SD_ILS:1284126 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Grumberg, O.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2033821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security and software for cybercaf&eacute;s ent://SD_ILS/0/SD_ILS:2261883 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Adomi, Esharenana E.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-903-8</a><br/>Format:&#160;Electronic Resources<br/> Malware Detection ent://SD_ILS/0/SD_ILS:505569 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Christodorescu, Mihai. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085213 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Science &ndash; CACIC 2017 23rd Argentine Congress, La Plata, Argentina, October 9-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084046 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;De Giusti, Armando Eduardo. editor. (orcid)0000-0002-6459-3592<br/><a href="https://doi.org/10.1007/978-3-319-75214-3">https://doi.org/10.1007/978-3-319-75214-3</a><br/>Format:&#160;Electronic Resources<br/> Windows 7 Tweaks : A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7. ent://SD_ILS/0/SD_ILS:1212635 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Sinchak, Steve.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=484905">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-On Ethical Hacking and Network Defense. ent://SD_ILS/0/SD_ILS:1305233 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Simpson, Michael T.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3136562">Click to View</a><br/>Format:&#160;Electronic Resources<br/> CompTIA Strata Study Guide : Exams FC0-U41, FC0-U11, and FC0-U21. ent://SD_ILS/0/SD_ILS:1228536 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Smith, Andrew.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=698007">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Accidental Librarian. ent://SD_ILS/0/SD_ILS:1311001 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;MacKellar, Pamela H.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3316128">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Microsoft Windows Intune 2.0 Quickstart Administration : Quickstart Administration. ent://SD_ILS/0/SD_ILS:1244617 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Overton, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=934515">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Eleventh Hour CISSP : Study Guide. ent://SD_ILS/0/SD_ILS:1263697 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Conrad, Eric.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1495655">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Maritime Security : An Introduction. ent://SD_ILS/0/SD_ILS:1199462 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;McNicholas, Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=365617">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Investigating Internet Crimes : An Introduction to Solving Crimes in Cyberspace. ent://SD_ILS/0/SD_ILS:1253490 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Shipley, Todd G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115158">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Death of the Internet. ent://SD_ILS/0/SD_ILS:1239227 2025-07-16T11:52:38Z 2025-07-16T11:52:38Z by&#160;Jakobsson, Markus.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=848529">Click to View</a><br/>Format:&#160;Electronic Resources<br/>