Call Number (LC) Title Results
QA76.76.C672 W58 2011eb Professional Windows Phone 7 game development : creating games using XNA Game Studio 4 / 2
QA76.76.C672 W93 2013 Torque 3D game development cookbook over 80 practical recipes and hidden gems for getting the most out of the Torque D game engine / 1
QA76.76.C672 Y36 2015eb The black art of multiplatform game programming / 1
QA76.76.C672.Z47 2004eb 3D Game Engine Programming. 1
QA76.76.C68 Cyber malware : offensive and defensive systems /
Android malware detection and adversarial methods
Windows virus and malware troubleshooting /
Viruses, hardware and software trojans attacks and countermeasures /
Malware diffusion models for modern complex networks : theory and applications /
A cyberworm that knows no boundaries /
Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /
Malware analysis using artificial intelligence and deep learning
Android malware detection using machine learning data-driven fingerprinting and threat intelligence /
Mastering Malware Analysis : the Complete Malware Analyst's Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks.
Mastering malware analysis : a malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks /
Ransomware & cyber extortion : response and prevention /
MALWARE SCIENCE a comprehensive guide to detection, analysis, and compliance /
Introduction to malware analysis for incident responders /
Evasive malware : a field guide to detecting, analyzing, and defeating advanced threats /
Ransomware and data extortion : the shifting threat landscape /
Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set /
The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack /
Introduction to malware /
Manually removing viruses and malware from Windows 7 /
WINDOWS APT WARFARE identify and prevent Windows APT attacks effectively /
Windows Ransomware Detection and Protection Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender.
Robert Slade's guide to computer viruses : how to avoid them, how to get rid of them, and how to get help.
The nuclear effect of computer malware : impact of politics on computer-controlled operational processes /
Ransomware und Cyber-Erpressung das Praxishandbuch für IT- und Systemverantwortliche /
Hajimete no maruwea kaiseki : Windows maruwea o kaisekisuru tame no gainen, tsūru, tekunikku o saguru /
Viruses in all dimensions : how an information code controls viruses, software and microorganisms /
The reign of botnets : defending against abuses, bots and fraud on the internet /
32
QA76.76.C68 A68 1995 Anti-virus tools and techniques for computer systems / 1
QA76.76.C68 A96 2006 Computer viruses and malware / 1
QA76.76.C68 A96 2006eb Computer viruses and malware 1
QA76.76.C68 C6 1989 The computer virus handbook. 1
QA76.76.C68 C64 1994 A short course on computer viruses / 1
QA76.76.C68 C66 2003eb Configuring Symantec Antivirus, Corporate Edition /
Configuring Symantec Antivirus, Corporate Edition
2
QA76.76.C68 .D86 2000eb Bigelow's virus troubleshooting pocket reference /
Bigelow's virus troubleshooting pocket reference
2
QA76.76.C68 E43 2000eb E-mail virus protection handbook.
E-mail virus protection handbook
2
QA76.76.C68 E445 2015 Advanced malware analysis / 1
QA76.76.C68 F45 1991 A pathology of computer viruses / 1
QA76.76.C68 F45 1992 A pathology of computer viruses / 1
QA76.76.C68 F55 2005 Computer viruses : from theory to applications / 1
QA76.76.C68 F55 2005eb Computer viruses from theory to applications / 1
QA76.76.C68 F57 1992 The computer virus crisis / 1
QA76.76.C68 G75 2001eb Malicious mobile code : virus protection for Windows / 1