|
1.
|
|
|
2.
|
|
|
3.
|
|
|
4.
|
Malware Detection [electronic resource] / edited by Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang. by Christodorescu, Mihai | Jha, Somesh | Maughan, Douglas | Song, Dawn | Wang, Cliff | SpringerLink (Online service). Source: Springer eBooksMaterial type: Computer file; Format:
electronic
available online
Publisher: Boston, MA : Springer Science+Business Media, LLC., 2007Online access: Click here to access online Availability: Items available for loan: Biblioteca DigitalCall number: QA76.9.A25 M31 2007 (1).
|
|
5.
|
|
|
6.
|
|
|
7.
|
|
|
8.
|
|
|
9.
|
|
|
10.
|
|
|
11.
|
|
|
12.
|
|
|
13.
|
|
|
14.
|
Insider Attack and Cyber Security [electronic resource] : Beyond the Hacker / edited by Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair. by Stolfo, Salvatore J | Bellovin, Steven M | Keromytis, Angelos D | Hershkop, Shlomo | Smith, Sean W | Sinclair, Sara | SpringerLink (Online service). Source: Springer eBooksMaterial type: Computer file; Format:
electronic
Publisher: Boston, MA : Springer Science+Business Media, LLC, 2008Online access: Click here to access online Availability: Items available for loan: Biblioteca DigitalCall number: QA76.9.A25 S76 2008 (1).
|
|
15.
|
|
|
16.
|
|
|
17.
|
|
|
18.
|
|
|
19.
|
|
|
20.
|
|