1. Android malware and analysis. ([2014]) Other Names: Dunham, Ken Record Type: Book Extent: 1 online resource (232 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. OS X incident response : scripting and analysis /: scripting and analysis. (2016) Authors: Bradley, Jaron Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Deception in the digital age : exploiting and defending human targets through computer-mediated communications /: exploiting and defending human targets through computer-mediated communications. (2015) Authors: Malin, Cameron H; Gudaitis, Terry; Holt, Thomas; Kilger, Max Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. The antivirus hacker's handbook. (2015) Authors: Koret, Joxean; Bachaalany, Elias Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. E-mail virus protection handbook. (2000) Other Names: Syngress Media, Inc. Record Type: Book Extent: 1 online resource (476 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Worm : the first digital world war /: the first digital world war. (©2011) Other Names: Bowden, Mark, 1951-; Amazon.com (Firm) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Windows ransomware protection and detection : countermeasures using practical approaches to reducing the risks of attacks on your infrastructure /: countermeasures using practical approaches to reducing the risks of attacks on your infrastructure. (2023) Authors: Sandbu, Marius Record Type: Book Extent: 1 online resource (287 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗