This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Subjects (1-15 of 15)
Operating systems (Computers) -- Security measures
1
2024
The Android malware handbook : manual analysis and ML-based detection
Han, Qian (Research scientist), author.
San Francisco : No Starch Press, [2024]
Rating:
Electronic Resources
2
2013
Android security : attacks and defenses
Misra, Anmol
Rating:
Electronic Resources
3
2013
Android security : attacks and defenses
Dubey, Abhishek (Information security)
Rating:
Electronic Resources
4
2013
Android Security Cookbook
Makan, Keith
Rating:
Electronic Resources
5
2011
A guide to kernel exploitation : attacking the core
Perla, Enrico, author.
Burlington, MA : Syngress, [2011]
Rating:
Electronic Resources
6
2013
The hacker's guide to OS X : exploiting OS X from the root up
Bathurst, Robert
Rating:
Electronic Resources
7
2012
iOS hacker's handbook
Indianapolis, Ind. : Wiley, [2012]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 ios Mil/Ihh
AVAILABLE
MELB
005.8 ios Mil/Ihh
AVAILABLE
MELB
005.8 ios Mil/Ihh
AVAILABLE
8
2012
IOS hacker's handbook
Rating:
Electronic Resources
9
2012
IOS Hacker's Handbook
Miller, Charlie
Rating:
Electronic Resources
10
2019
Karma-based API on Apple platforms : building privacy into iOS and macOS apps
Carrasco Molina, Manuel, author
[California] : Apress Media, [2019]
Rating:
Electronic Resources
11
2015
Learning Linux security : a deep dive into securing your Linux distribution
Messier, Ric, speaker.
[Place of publication not identified] : Infinite Skills, 2015
Rating:
Electronic Resources
12
2023
Mobile OS Vulnerabilities Quantitative and Qualitative Analysis
Garg, Shivi
Rating:
Electronic Resources
13
2017
Operating system forensic analysis
[First edition]
[Place of publication not identified] : O'Reilly Media, Inc., [2017]
Rating:
Electronic Resources
14
2016
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes
Kalsi, Tajinder, author
Birmingham, UK : Packt Publishing, 2016
Rating:
Electronic Resources
More...
15
1991
Security in computer operating systems
O'Shea, G
Manchester, England : NCC Blackwell, 1991
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Osh/Sic
AVAILABLE
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search