Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 37 from your keywords: subject="Malware"
First Page Previous 1 2 3 4
cover
Malware: fighting malicious code
Comment Share
Skoudis, EdZeltser, Lenny

Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion

Edition
1st edition
ISBN/ISSN
9780131014053
Collation
xxii, 647 hal.; ilus.; 23 cm
Series Title
Prentice Hall series in computer networking and distributed systems
Call Number
005.84 SKO m
Availability1
Add to basket
MARC DownloadCite
cover
The art of computer virus research and defense
Comment Share
Szor, Peter

Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …

Edition
--
ISBN/ISSN
0321304543
Collation
xxvii, 713 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 SZO a
Availability1
Add to basket
MARC DownloadCite
cover
Malware, rootkits & botnets: a beginner's guide
Comment Share
Elisan, Christopher C.

Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …

Edition
--
ISBN/ISSN
9780071792066
Collation
xxvi, 353 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 ELI m
Availability1
Add to basket
MARC DownloadCite
cover
Advanced malware analysis
Comment Share
Elisan, Christopher C.

Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …

Edition
--
ISBN/ISSN
9780071819749
Collation
xxii, 522 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 ELI a
Availability1
Add to basket
MARC DownloadCite
cover
The Art of memory forensics
Comment Share
Case, AndrewLevy, JamieLigh, Michael HaleTimWalters, Aaron

Detecting malware adn threats in windows, linux and Mac

Edition
first
ISBN/ISSN
9781118825099
Collation
xxiii,886hal.;ilus.;23,5cm
Series Title
null
Call Number
005.8 LIG a
Availability1
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability1
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?