Searching Books & More : "Computer security"

Computer viruses X
24 results found in Books & More
RSS
Cover images provided by Open Library

A guide to the selection of anti-virus tools and techniques

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington : For sale by the Supt. of Docs., U.S. G.P.O. ; [Springfield, VA : Order from the National Technical Information Service], 1992 [i.e. 1993]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

The art of computer virus research and defense

Published: Upper Saddle River, NJ : Addison-Wesley, 2005
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Buffer overflow attacks detect, exploit, prevent

Published: Rockland, Mass. : Syngress, 2005
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Malicious mobile code virus protection for Windows

Published: Sebastopol, CA : O'Reilly & Associates, 2001
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Techniques virales avancees

Published: Paris : Springer, 2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide to Malware incident prevention and handling

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Minimizing the effects of malware on your computer

Published: [Washington, D.C.] : Federal Trade Commission, [2008]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Seven deadliest Microsoft attacks

Published: Amsterdam ; Boston : Syngress/Elsevier, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Absolute beginner's guide to security, spam, spyware and viruses

Published: Indianapolis, Ind. : Que, 2005
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Buffer overflow attacks : detect, exploit, prevent

Published: Rockland, MA : Syngress, c2005
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Information security subcommittee questions concerning the Melissa computer virus

Published: Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, [1999]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Malware forensics investigating and analyzing malicious code

Published: Burlington, MA : Syngress Publishing, 2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Malware forensics investigating and analyzing malicious code

Published: Burlington, Mass. : Syngress, c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Seven deadliest Microsoft attacks

Published: Burlington, MA : Syngress/Elsevier, c2010
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Threat assessment of malicious code and human threats

Published: [Gaithersburg, Md.] : National Institute of Standards and Technology, [1992]
Format: Electronic Resource, Remote
Retrieving Holdings Information