Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "malware mitigation"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
"malware mitigation" »
"malware litigation"
Showing
1
-
6
of
6
Search:
'"malware mitigation"'
,
query time: 0.17s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
Published 2014
Springer International Publishing
Table of Contents:
“
... detection and
malware
mitigation
-- Security in hardware -- Systems security -- Network security -- Database...
”
Read Now
2
Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
Published 2014
Springer International Publishing
Table of Contents:
“
... detection and
malware
mitigation
-- Security in hardware -- Systems security -- Network security -- Database...
”
Read Now
3
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers
Published 2020
Springer Nature Singapore
Table of Contents:
“
... -- Intrusion/Anomaly Detection and
Malware
Mitigation
-- Social Network Security and Privacy.-Systems Security...
”
Read Now
4
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents:
“
... of mobile malware -- Debugging and disassembly of MMC -- Mobile
malware
mitigation
measures...
”
Call Number:
TK5102.85
Read Now
5
Cyber Malware : Offensive and Defensive Systems
Published 2024
Springer International Publishing
Table of Contents:
“
... for IoT Intrusion Detection Based on Feature Selection and Oversampling -- Chapter 9.
Malware
Mitigation
...
”
Read Now
6
Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterp...
by
Woody, Aaron
Published 2013
Packt Pub.
Table of Contents:
“
... prevention; Advanced
malware
mitigation
; Intrusion detection and prevention; Intrusion detection; Intrusion...
”
Call Number:
TK5103.4885 .W384 2013
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
4
001 - Knowledge
1
330 - Economics
1
331 - Labor economics
1
364 - Criminology
1
384 - Communications; telecommunication
1
more ...
621 - Applied physics
1
658 - General management
1
see all ...
less ...
Language
English
6
Collection
Springer eBooks 2005-
4
O'Reilly
2
Author
Kutylowski, Miroslaw
2
Vaidya, Jaideep
2
Abu-Nimeh, Saeed
1
Almomani, Iman
1
Ayres, Nick
1
Dunham, Ken
1
more ...
Ferrag, Mohamed Amine
1
Lang, Bo
1
Lu, Wei
1
Maglaras, Leandros A.
1
Wen, Qiaoyan
1
Woody, Aaron
1
Zhang, Yuqing
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=%22malware+mitigation%22&type=AllFields
Send by Email
×
Loading...