To see the other types of publications on this topic, follow the link: Malware.

Books on the topic 'Malware'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Malware.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Gritzalis, Dimitris, Kim-Kwang Raymond Choo, and Constantinos Patsakis, eds. Malware. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-66245-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krieg, Christian, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. Hardware Malware. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02338-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Christodorescu, Mihai, Somesh Jha, Douglas Maughan, Dawn Song, and Cliff Wang, eds. Malware Detection. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-44599-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Xuxian, and Yajin Zhou. Android Malware. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Xuxian. Android Malware. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Almomani, Iman, Leandros A. Maglaras, Mohamed Amine Ferrag, and Nick Ayres, eds. Cyber Malware. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-34969-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yin, Heng, and Dawn Song. Automatic Malware Analysis. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5523-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Davis, Michael A. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lenny, Zeltser, ed. Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall/PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mohanta, Abhijit, and Anoop Saldanha. Malware Analysis and Detection Engineering. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bettany, Andrew, and Mike Halsey. Windows Virus and Malware Troubleshooting. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2607-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Labaca Castro, Raphael. Machine Learning under Malware Attack. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-40442-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kasperskij, Evgenij V. Malware: Von Viren, Würmern, Hackern und Trojanern und wie man sich vor ihnen schützt ; [inkl. 90-Tage-Testversion Kaspersky Internet Security 7.0]. München: Hanser, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Karbab, ElMouatez Billah, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. Android Malware Detection using Machine Learning. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74664-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Niu, Weina, Xiaosong Zhang, Ran Yan, and Jiacheng Gong. Android Malware Detection and Adversarial Methods. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1459-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Latifur, Khan, and Thuraisingham Bhavani M, eds. Data mining tools for malware detection. Boca Raton, FL: CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Aquilina, James M. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Dabić, Ivan. Malware. Lulu Press, Inc., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Malware Forensics. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-268-3.x0001-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dabrowski, Adrian, Heidelinde Hobel, Edgar Weippl, and Christian Krieg. Hardware Malware. Morgan & Claypool Publishers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Dabrowski, Adrian, Edgar Weippl, and Christian Krieg. Hardware Malware. Springer International Publishing AG, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jiang, Xuxian, and Yajin Zhou. Android Malware. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tech, Solis. Cryptography & Malware. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nandal, Priyanka. Malware Detection. Anchor Academic Publishing. ein Imprint der Diplomica Verlag GmbH, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tech, Solis. Hacking + Malware + Robotics. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Malware In Silicon. Morgan & Claypool, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Oktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Oktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Advanced Malware Analysis. McGraw-Hill Education, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Davis, Michael A. Hacking Exposed Malware & Rootkits: Malware & Rootkits Secrets & Solutions (Hacking Exposed). McGraw-Hill Osborne Media, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Tech, Solis. Hacking + Malware + CompTIA A+. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Linux Malware Incident Response. Elsevier, 2013. http://dx.doi.org/10.1016/c2012-0-06113-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dunham, Ken, Shane Hartman, Manu Quintans, Jose Andre Morales, and Tim Strazzere. Android Malware and Analysis. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Computer Viruses and Malware. Springer US, 2006. http://dx.doi.org/10.1007/0-387-34188-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Skoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dunham, Ken, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Malware & Human-Computer Interaction. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Skoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall Ptr, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Morales, Jose Andre, Tim Strazzere, Ken Dunham, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Auerbach Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Surendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kendall, Kris. Art of Malware Analysis. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Morales, Jose Andre, Tim Strazzere, Ken Dunham, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Auerbach Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Surendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Surendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tech, Solis. Hacking + Malware + Open Source. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography