1
by Datt, Samir
Published 2016
Packt Publishing
..., and malware attacks...

2
by Grimes, Roger A.
Published 2022
Wiley
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...

3
Published 2009
IT Governance Pub.
Table of Contents: ...; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity...

4
by Calder, Alan
Published 2008
IT Governance
Table of Contents: ... -- HAVE AN UP-TO-DATE FIREWALL; CHAPTER 5: RULE 5 -- HAVE UP-TO-DATE ANTI-MALWARE SOFTWARE; CHAPTER 6...

5
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 13. User authentication methods -- ch. 14. Computer and network forensics -- ch. 15. Malware...

6
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ... 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications...

7
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications...

8
by Baker, Debra
Published 2024
Packt Publishing Ltd.
Table of Contents: ... -- Summary -- Chapter 5: Securing Your Endpoints -- Antivirus/anti-malware -- Virtual private network (VPN...