Call Number (LC) Title Results
QA76.76.C672 W38 2009 Zune game development using XNA 3.0
Zune game development using XNA 3.0 /
2
QA76.76.C672 .W382 2003b Advanced 3D game programming using DirectX 9.0 2
QA76.76.C672 .W384 2014 Das Blender-Buch : 3D-Grafik und Animation mit Blender. 1
QA76.76.C672 W39 2001 3D games : real-time rendering and software technology / 1
QA76.76.C672 .W42 2005 Advanced game development with programmable graphics hardware / 1
QA76.76.C672 .W42 2005eb Advanced game development with programmable graphics hardware / 1
QA76.76.C672 W45 2004 Beginning .NET game programming in C♯ / 1
QA76.76.C672 W454 2004 Beginning .NET game programming in VB.NET 1
QA76.76.C672 W544 2012 Learning HTML5 game programming : a hands-on guide to building online games using Canvas, SVG, and WebGL / 1
QA76.76.C672.W545 2006eb Game Engine Toolset Development. 1
QA76.76.C672 W58 2011eb Professional Windows Phone 7 game development : creating games using XNA Game Studio 4 / 2
QA76.76.C672 W93 2013 Torque 3D game development cookbook over 80 practical recipes and hidden gems for getting the most out of the Torque D game engine / 1
QA76.76.C672 Y36 2015eb The black art of multiplatform game programming / 1
QA76.76.C672.Z47 2004eb 3D Game Engine Programming. 1
QA76.76.C68 Cyber malware : offensive and defensive systems /
Android malware detection and adversarial methods
Windows virus and malware troubleshooting /
Viruses, hardware and software trojans attacks and countermeasures /
Malware diffusion models for modern complex networks : theory and applications /
A cyberworm that knows no boundaries /
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
Malware analysis using artificial intelligence and deep learning
Android malware detection using machine learning data-driven fingerprinting and threat intelligence /
Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.
Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks /
Ransomware & cyber extortion : response and prevention /
MALWARE SCIENCE a comprehensive guide to detection, analysis, and compliance /
Introduction to malware analysis for incident responders /
Evasive malware : a field guide to detecting, analyzing, and defeating advanced threats /
Ransomware and data extortion : the shifting threat landscape /
Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set /
The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack /
Introduction to malware /
Manually removing viruses and malware from Windows 7 /
WINDOWS APT WARFARE identify and prevent Windows APT attacks effectively /
Windows Ransomware Detection and Protection Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender.
Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help.
The nuclear effect of computer malware : impact of politics on computer-controlled operational processes /
Ransomware und Cyber-Erpressung das Praxishandbuch für IT- und Systemverantwortliche /
Hajimete no maruwea kaiseki : Windows maruwea o kaisekisuru tame no gainen, tsūru, tekunikku o saguru /
Viruses in all dimensions : how an information code controls viruses, software and microorganisms /
The reign of botnets : defending against abuses, bots and fraud on the internet /
32
QA76.76.C68 A68 1995 Anti-virus tools and techniques for computer systems / 1
QA76.76.C68 A96 2006 Computer viruses and malware / 1
QA76.76.C68 A96 2006eb Computer viruses and malware 1
QA76.76.C68 C6 1989 The computer virus handbook. 1
QA76.76.C68 C64 1994 A short course on computer viruses / 1