1. Automatic defense against zero-day polymorphic worms in communication networks. (2013) Authors: Mohammed, Mohssen, 1982-; Pathan, Al-Sakib Khan Record Type: Book Extent: 1 online resource (1 volume), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Malware forensics : investigating and analyzing malicious code /: investigating and analyzing malicious code. (©2008) Other Names: Aquilina, James M; Casey, Eoghan; Malin, Cameron H Record Type: Book Extent: 1 online resource (xxxvi, 676 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Freedom. (2010) Authors: Suarez, Daniel, 1964- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Transmission. (2005) Other Names: Kunzru, Hari, 1969- Record Type: Book Extent: 1 online resource (296 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Cuckoo Malware Analysis. (2013) Other Names: Oktavianto, Digit Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Viruses, hardware and software trojans : attacks and countermeasures /: attacks and countermeasures. ([2020]) Authors: Belous, A. I (Anatoliĭ Ivanovich); Saladukha, Vitali Record Type: Book Extent: 1 online resource (xxii, 822 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Trojan Horse. (2009) Other Names: Cerasini, Marc A, 1952- Record Type: Book Extent: 1 online resource (352 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. E-mail virus protection handbook. (2000) Other Names: Syngress Media, Inc. Record Type: Book Extent: 1 online resource (476 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Worm : the first digital world war /: the first digital world war. (©2011) Other Names: Bowden, Mark, 1951-; Amazon.com (Firm) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Disruptive security technologies with mobile code and peer-to-peer networks. (©2005) Other Names: Brooks, R. R (Richard R.) Record Type: Book Extent: 1 online resource (381 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗