This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-14 of 14)
COMPUTERS -- Security -- Viruses & Malware.
1
2014
Android malware and analysis
Dunham, Ken
©20
Rating:
Electronic Resources
More...
2
2013
Cuckoo Malware Analysis
Oktavianto, Digit
Rating:
Electronic Resources
More...
3
2015
Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools
Sivarajan, Santhosh, author
Birmingham, UK : Packt Publishing, 2015
Rating:
Electronic Resources
4
2018
Honeypot frameworks and their applications : a new framework
Ng, Chee Keong, author
Singapore : Springer, 2018
Rating:
Electronic Resources
More...
5
2022
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
Skulkin, Oleg.
Rating:
Electronic Resources
6
2018
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware
K. A., Monnappa, author
Birmingham, UK : Packt Publishing, 2018
Rating:
Electronic Resources
More...
7
2018
Malware data science : attack detection and attribution
Saxe, Joshua, author
San Francisco, CA : No Starch Press, [2018]
Rating:
Electronic Resources
8
2016
Mastering Kali Linux Wireless Pentesting
Ram, Jilumudi Raghu, author
Rating:
Electronic Resources
9
2016
The nuclear effect of computer malware : impact of politics on computer-controlled operational processes
Tipi, Lucian, author.
Rating:
Electronic Resources
10
2012
Practical Malware Analysis : a Hands-On Guide to Dissecting Malicious Software
Sikorski, Michael
Rating:
Electronic Resources
11
2012
Practical malware analysis : the hands-on guide to dissecting malicious software
Sikorski, Michael.
Rating:
Electronic Resources
12
2022
Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory
Ostrovskaya, Svetlana, author
Rating:
Electronic Resources
13
2019
Rootkits and bootkits : reversing modern malware and next generation threats
Matrosov, Alex, author.
San Francisco : No Starch Press, Inc., [2019]
Rating:
Electronic Resources
14
2012
Software similarity and classification
Cesare, Silvio
Rating:
Electronic Resources
More...
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search