Books on the topic 'Malware (Software de computador)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Malware (Software de computador).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Sean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textShane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textInc, ebrary, ed. Malware analyst's cookbook and dvd: Tools and techniques for fighting malicious code. Indianapolis, Ind: Wiley Pub., Inc, 2011.
Find full textLenny, Zeltser, ed. Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall/PTR, 2004.
Find full textPC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textManoel Joaquim Pereira dos Santos. A proteção autoral de programas de computador. Rio de Janeiro: Editora Lumen Juris, 2008.
Find full textEoghan, Casey, and Malin Cameron H, eds. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.
Find full textAquilina, James M. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.
Find full textTittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textA bug hunter's diary: A guided tour through the wilds of software security. San Francisco: No Starch Press, 2011.
Find full textAndrew, Honig, ed. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.
Find full textEoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Waltham, MA: Syngress, 2012.
Find full textPractical Reverse Engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis: John Wiley & Sons, Inc., 2014.
Find full textRojas, Sergio, ed. Aprendiendo a programar en Python con mi computador: Pimeros pasos rumbo a cómputos de gran escala en las ciencias e ingenierías. Caracas, Venezuela: Proyecto LATIn, 2016.
Find full textShema, Mike. Seven deadliest web application attacks. Edited by Ely Adam. Amsterdam: Syngress, 2010.
Find full textHolz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textBaltisser, Annina. Datenbeschädigung und Malware im Schweizer Strafrecht: Der Tatbestand des Art. 144bis StGB im Vergleich mit den Vorgaben der Cybercrime Convention und der deutschen Regelung. Zürich: Schulthess, 2013.
Find full textExamining the cyber threat to critical infrastructure and the American economy: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, March 16, 2011. Washington: U.S. G.P.O., 2012.
Find full textCorporation, Symantec. Norton utilities for Windows 95: User's guide. Cupertino, Calif: Symantec, 1995.
Find full textAdam, Ely, ed. Seven deadliest web application attacks. Amsterdam: Syngress, 2010.
Find full textCyber security, 2010: Hearings before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, second session. Washington: U.S. G.P.O., 2011.
Find full textPerez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Amsterdam: Syngress, 2010.
Find full textLaurel, Brenda. Computers as theatre. Reading, Mass: Addison-Wesley Pub. Co., 1993.
Find full textWang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer, 2010.
Find full textDavis, Michael A. Hacking Exposed Malware & Rootkits: Malware & Rootkits Secrets & Solutions (Hacking Exposed). McGraw-Hill Osborne Media, 2008.
Find full textAutomatic Malware Analysis An Emulator Based Approach. Springer-Verlag New York Inc., 2012.
Find full textBorrelli, Mark. Malware and Computer Security Incidents: Handling Guides. Nova Science Publishers, Incorporated, 2013.
Find full textAndroid Malware Springerbriefs in Computer Science. Springer-Verlag New York Inc., 2013.
Find full textSkoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall PTR, 2003.
Find full textKaryotis, Vasileios, and M. H. R. Khouzani. Malware Diffusion Models for Modern Complex Networks: Theory and Applications. Elsevier Science & Technology Books, 2016.
Find full textauthor, Davis Michael 1982, Bodmer Sean author, and LeMasters Aaron author, eds. Hacking exposed: Malware and rootkits : security secrets & solutions. McGraw-Hill Education, 2017.
Find full textSaxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Find full textMatrosov, Alex, Eugene Rodionov, and Sergey Bratus. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats. No Starch Press, 2019.
Find full textHoward, Eric, Omar Santos, Andrae Middleton, Neal Humphrey, and Panos Kampanakis. Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP. Pearson Education, Limited, 2016.
Find full textAycock, John. Computer Viruses and Malware (Advances in Information Security). Springer, 2006.
Find full text(Editor), Mihai Christodorescu, Somesh Jha (Editor), Douglas Maughan (Editor), Dawn Song (Editor), and Cliff Wang (Editor), eds. Malware Detection (Advances in Information Security). Springer, 2006.
Find full textHow to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.
Find full textTargeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware. Elsevier Science, 2014.
Find full textComputer viruses and other malicious software: A threat to the Internet economy. Paris: OECD, 2009.
Find full textOrganisation for Economic Co-operation and Development. and SourceOECD (Online service), eds. Computer viruses and other malicious software: A threat to the Internet economy. Paris: OECD, 2009.
Find full text