Your search returned 11 results.

|
1.
Android Malware and Analysis.

by Dunham, Ken | Hartman, Shane | Quintans, Manu | Morales, Jose Andre | Strazzere, Tim.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
2.
Technology and the Law on the Use of Force : New Security Challenges in the Twenty-First Century

by Maogoto, Jackson.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: KZ6718 .M34 2014.
3.
Technology and the Law on the Use of Force : New Security Challenges in the Twenty-First Century.

by Maogoto, Jackson.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: London : Taylor and Francis, 2014Copyright date: ©2015Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: KZ6718 -- .M364 2015.
4.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory.

by Hale Ligh, Michael | Case, Andrew | Levy, Jamie | Walters, Aaron.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : John Wiley & Sons, Incorporated, 2014Copyright date: ©2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25L54 2014.
5.
Android Malware.

by Jiang, Xuxian | Zhou, Yajin.

Material type: Text Text; Format: electronic available online remote Publisher: Dordrecht : Springer, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.76.C68.
6.
Hardware Malware.

by Krieg, Christian | Dabrowski, Adrian.

Material type: Text Text; Format: electronic available online remote Publisher: San Rafael : Morgan & Claypool Publishers, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9 .A25.
7.
Detection of intrusions and malware, and vulnerability assessment : 4th international conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 : proceedings / Bernhard M. Hämmerli, Robin Sommer (eds.).

by DIMVA 2007 (2007 : Lucerne, Switzerland) | Hämmerli, Bernhard M | Sommer, Robin.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: DIMVA 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 D563 2007.
8.
Computer viruses and malware / by John Aycock.

by Aycock, John Daniel, 1970-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York ; London : Springer, 2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Withdrawn (1). Location(s): Online Call number: QA76.76.C68 A96 2006.
9.
Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings / Roland Büschkes, Pavel Laskov (eds.).

by DIMVA 2006 (2006 : Berlin, Germany) | Büschkes, Roland | Laskov, Pavel.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2006Other title: DIMVA 2006.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 D563 2006.
10.
Malware detection / Mihai Christodorescu ... [et al.].

by Christodorescu, Mihai.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York : Springer, 2006Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 M3182 2006.
11.
Detection of intrusions and malware, and vulnerability assessment : second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings / Klaus Julisch, Christopher Kruegel (eds.).

by DIMVA 2005 (2005 : Vienna, Austria) | Julisch, Klaus | Kruegel, Christopher, 1976-.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2005Other title: DIMVA 2005.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 D563 2005.