121
by Shema, Mike
Published 2010
Syngress
Subjects: ...Malware (Computer software) / Prevention...

122
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ...""; ""Summary""; ""Chapter 5 : Inspecting Malware Traffic""; ""Gearing up Wireshark""; ""Updated columns...

123
by Sivarajan, Santhosh
Published 2015
Packt Publishing
Subjects: ...COMPUTERS / Security / Viruses & Malware / bisacsh...

124
by Maglaras, Leandros
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...malware analysis...

125
by Szor, Peter
Published 2005
Addison-Wesley
Subjects: ...Malware / gnd / http://d-nb.info/gnd/4687059-3...

126
by Timm, Carl
Published 2010
Syngress/Elsevier
Table of Contents: ...Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin...

127
by Sutton, David
Published 2022
BCS, The Chartered Institute for IT
Subjects: ...COMPUTERS / Security / Viruses & Malware / bisacsh...

128
by Wade, Todd
Published 2022
BCS, The Chartered Institute for IT
Subjects: ...COMPUTERS / Security / Viruses & Malware / bisacsh...

129
by Szczypiorski, Krzysztof
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...malware detection...

130
by Lorincz, Josip
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...malware detection...

131
Published 2009
OECD Publishing
Table of Contents: ...What Is Already Being Done? -- Malware Attacks: Why, When and How? -- Executive Summary...

132
Published 2022
Springer International Publishing
Table of Contents: ...Part I: Malware-Related Topics -- Generation of Adversarial Malware and Benign Examples using...

133
by Willems, Eddy
Published 2015
Springer Fachmedien Wiesbaden
Table of Contents: ...30 Jahre Malware: ein kurzer Überblick -- Profile von Malware-Autoren -- Die Untergrund...

134
by Willems, Eddy
Published 2019
Springer International Publishing
Table of Contents: ...Thirty Years of Malware: A Short Outline -- Malware Author Profiles -- The Digital Underground...

135
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Analysis -- Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009 -- Inferring...

136
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Grammar and Genetic Operators to Evolve Malware -- Method for Detecting Unknown Malicious Executables...

137
by Hole, Kjell Jørgen
Published 2016
Springer International Publishing
Table of Contents: ... Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness...

138
by Santos, Omar, Kampanakis, Panos, Woland, Aaron T.
Published 2017
Cisco Press
Table of Contents: ...: malware analysis and threat intelligence -- Introduction to and deployment of Cisco next-generation IPS...

139
by Hypponen, Mikko
Published 2022
Wiley
Table of Contents: ... fighting? ; The Rolex -- Malware: then, now, and in the near future. The history of malware ; Smartphones...

140
by Gregg, Michael
Published 2015
Wiley
Table of Contents: ... -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection...