To see the other types of publications on this topic, follow the link: Malware (Software de computador).

Books on the topic 'Malware (Software de computador)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Malware (Software de computador).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Sean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inc, ebrary, ed. Malware analyst's cookbook and dvd: Tools and techniques for fighting malicious code. Indianapolis, Ind: Wiley Pub., Inc, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lenny, Zeltser, ed. Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall/PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manoel Joaquim Pereira dos Santos. A proteção autoral de programas de computador. Rio de Janeiro: Editora Lumen Juris, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eoghan, Casey, and Malin Cameron H, eds. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aquilina, James M. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A bug hunter's diary: A guided tour through the wilds of software security. San Francisco: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mobile malware attacks and defense. Burlington, MA: Elsevier, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Andrew, Honig, ed. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Microsoft security essentials user manual. [Indianapolis, Indiana]: Que, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Eoghan, Casey, and Aquilina James M, eds. Malware forensics field guide for Windows systems: Digital forensics field guides. Waltham, MA: Syngress, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Practical Reverse Engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis: John Wiley & Sons, Inc., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rojas, Sergio, ed. Aprendiendo a programar en Python con mi computador: Pimeros pasos rumbo a cómputos de gran escala en las ciencias e ingenierías. Caracas, Venezuela: Proyecto LATIn, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shema, Mike. Seven deadliest web application attacks. Edited by Ely Adam. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Holz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Baltisser, Annina. Datenbeschädigung und Malware im Schweizer Strafrecht: Der Tatbestand des Art. 144bis StGB im Vergleich mit den Vorgaben der Cybercrime Convention und der deutschen Regelung. Zürich: Schulthess, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Examining the cyber threat to critical infrastructure and the American economy: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, March 16, 2011. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Corporation, Symantec. Norton utilities for Windows 95: User's guide. Cupertino, Calif: Symantec, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Adam, Ely, ed. Seven deadliest web application attacks. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Cyber security, 2010: Hearings before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, second session. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Perez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Amsterdam: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Laurel, Brenda. Computers as theatre. Reading, Mass: Addison-Wesley Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Computers as theatre. Reading, Mass: Addison-Wesley Pub., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Computers as theatre. Reading, Mass: Addison-Wesley Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Advanced Malware Analysis. McGraw-Hill Education, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Davis, Michael A. Hacking Exposed Malware & Rootkits: Malware & Rootkits Secrets & Solutions (Hacking Exposed). McGraw-Hill Osborne Media, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Automatic Malware Analysis An Emulator Based Approach. Springer-Verlag New York Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Borrelli, Mark. Malware and Computer Security Incidents: Handling Guides. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Malware Rootkits Botnets A Beginners Guide. McGraw-Hill/Osborne Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Android Malware Springerbriefs in Computer Science. Springer-Verlag New York Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Skoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Karyotis, Vasileios, and M. H. R. Khouzani. Malware Diffusion Models for Modern Complex Networks: Theory and Applications. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Detecting and Combating Malicious Email. Syngress Media,U.S., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

author, Davis Michael 1982, Bodmer Sean author, and LeMasters Aaron author, eds. Hacking exposed: Malware and rootkits : security secrets & solutions. McGraw-Hill Education, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Tittel, Ed. PC Magazine Fighting Spyware, Viruses, and Malware. Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Matrosov, Alex, Eugene Rodionov, and Sergey Bratus. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats. No Starch Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Howard, Eric, Omar Santos, Andrae Middleton, Neal Humphrey, and Panos Kampanakis. Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP. Pearson Education, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Malware Forensics Field Guide for Linux Systems. Syngress Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

AVIEN Malware Defense Guide for the Enterprise. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Aycock, John. Computer Viruses and Malware (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

(Editor), Mihai Christodorescu, Somesh Jha (Editor), Douglas Maughan (Editor), Dawn Song (Editor), and Cliff Wang (Editor), eds. Malware Detection (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Targeted Cyber Attacks Multistaged Attacks Driven By Exploits And Malware. Elsevier Science, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Computer viruses and other malicious software: A threat to the Internet economy. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Organisation for Economic Co-operation and Development. and SourceOECD (Online service), eds. Computer viruses and other malicious software: A threat to the Internet economy. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography