Books on the topic 'Malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Gritzalis, Dimitris, Kim-Kwang Raymond Choo, and Constantinos Patsakis, eds. Malware. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-66245-4.
Full textKrieg, Christian, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. Hardware Malware. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02338-5.
Full textChristodorescu, Mihai, Somesh Jha, Douglas Maughan, Dawn Song, and Cliff Wang, eds. Malware Detection. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-44599-1.
Full textJiang, Xuxian, and Yajin Zhou. Android Malware. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7.
Full textAlmomani, Iman, Leandros A. Maglaras, Mohamed Amine Ferrag, and Nick Ayres, eds. Cyber Malware. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-34969-0.
Full textYin, Heng, and Dawn Song. Automatic Malware Analysis. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5523-3.
Full textDavis, Michael A. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textSean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textShane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textLenny, Zeltser, ed. Malware: Fighting malicious code. Upper Saddle River, NJ: Prentice Hall/PTR, 2004.
Find full textMohanta, Abhijit, and Anoop Saldanha. Malware Analysis and Detection Engineering. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4.
Full textBettany, Andrew, and Mike Halsey. Windows Virus and Malware Troubleshooting. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2607-0.
Full textLabaca Castro, Raphael. Machine Learning under Malware Attack. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-40442-0.
Full textKasperskij, Evgenij V. Malware: Von Viren, Würmern, Hackern und Trojanern und wie man sich vor ihnen schützt ; [inkl. 90-Tage-Testversion Kaspersky Internet Security 7.0]. München: Hanser, 2008.
Find full textKarbab, ElMouatez Billah, Mourad Debbabi, Abdelouahid Derhab, and Djedjiga Mouheb. Android Malware Detection using Machine Learning. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74664-3.
Full textNiu, Weina, Xiaosong Zhang, Ran Yan, and Jiacheng Gong. Android Malware Detection and Adversarial Methods. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1459-9.
Full textLatifur, Khan, and Thuraisingham Bhavani M, eds. Data mining tools for malware detection. Boca Raton, FL: CRC Press, 2012.
Find full textTittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textAquilina, James M. Malware forensics: Investigating and analyzing malicious code. Burlington, MA: Syngress Pub., 2008.
Find full textMalware Forensics. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-268-3.x0001-1.
Full textWang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer London, Limited, 2007.
Find full textDabrowski, Adrian, Heidelinde Hobel, Edgar Weippl, and Christian Krieg. Hardware Malware. Morgan & Claypool Publishers, 2013.
Find full textDabrowski, Adrian, Edgar Weippl, and Christian Krieg. Hardware Malware. Springer International Publishing AG, 2013.
Find full textWang, Cliff, Somesh Jha, Mihai Christodorescu, Douglas Maughan, and Dawn Song. Malware Detection. Springer, 2010.
Find full textTech, Solis. Cryptography & Malware. CreateSpace Independent Publishing Platform, 2016.
Find full textNandal, Priyanka. Malware Detection. Anchor Academic Publishing. ein Imprint der Diplomica Verlag GmbH, 2017.
Find full textTech, Solis. Hacking + Malware + Robotics. CreateSpace Independent Publishing Platform, 2016.
Find full textOktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, Limited, 2013.
Find full textOktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, 2013.
Find full textDavis, Michael A. Hacking Exposed Malware & Rootkits: Malware & Rootkits Secrets & Solutions (Hacking Exposed). McGraw-Hill Osborne Media, 2008.
Find full textTech, Solis. Hacking + Malware + CompTIA A+. CreateSpace Independent Publishing Platform, 2016.
Find full textLinux Malware Incident Response. Elsevier, 2013. http://dx.doi.org/10.1016/c2012-0-06113-3.
Full textDunham, Ken, Shane Hartman, Manu Quintans, Jose Andre Morales, and Tim Strazzere. Android Malware and Analysis. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17598.
Full textComputer Viruses and Malware. Springer US, 2006. http://dx.doi.org/10.1007/0-387-34188-9.
Full textSkoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall PTR, 2003.
Find full textDunham, Ken, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Taylor & Francis Group, 2014.
Find full textMalware & Human-Computer Interaction. CreateSpace Independent Publishing Platform, 2016.
Find full textSkoudis, Ed, and Lenny Zeltser. Malware: Fighting Malicious Code. Prentice Hall Ptr, 2005.
Find full textMorales, Jose Andre, Tim Strazzere, Ken Dunham, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Auerbach Publishers, Incorporated, 2014.
Find full textSurendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textMorales, Jose Andre, Tim Strazzere, Ken Dunham, Shane Hartman, and Manu Quintans. Android Malware and Analysis. Auerbach Publishers, Incorporated, 2014.
Find full textSurendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textSurendran, Roopak, Teenu S. John, Tony Thomas, and Mamoun Alazab. Intelligent Mobile Malware Detection. Taylor & Francis Group, 2022.
Find full textTech, Solis. Hacking + Malware + Open Source. CreateSpace Independent Publishing Platform, 2016.
Find full text