Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-11 of 11)
Malware Computer Software
1
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
Print Material
 

Best practices for continuity of operations (handling destructive malware)



[Washington, D.C.] : Homeland Security, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 2.2:M 29    ---  Available
3
Electronic Book
 

Cuckoo malware analysis : analyze malware using Cuckoo Sandbox


Oktavianto, Digit.
Birmingham : Packt Publishing, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
4
Electronic Book
 

Cyberterrorism after Stuxnet


Chen, Thomas M., author.
Carlisle Barracks, PA : Strategic Studies Institute and U.S. Army War College Press, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146:C 99/3    ---  Available
5
ElectronicResource GovDoc
 

Examining the cyber threat to critical infrastructure and the American economy hearing before the Su


United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.
Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.H 75:112-11    ---  Available
6
Electronic Book
 

How to defeat advanced malware : new tools for protection and forensics


Dalziel, Max, author.
Waltham, Massachusetts : Syngress, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
7
Electronic Book
 

Illicit IT : bankrolling Kim Jong Un : hearing before the Subcommittee Indo-Pacific of the Committee


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Indo-Pacific, author.
Washington : U.S. Government Publishing Office, 2024. 2024

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:118-44    ---  Available
8
Electronic Book
 

Justice Department's evolving efforts on ransomware.


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2022- 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
9
Electronic Book
 

Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate W


Monnappa K A, author.
Birmingham ; Mumbai : Packt, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
10
Electronic Book
 

Malware analyst's cookbook and dvd tools and techniques for fighting malicious code


Ligh, Michael W.
Indianapolis, Ind. : Wiley Pub., Inc, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
11
Electronic Book
 

Malware diffusion models for modern complex networks : theory and applications


Karyotis, Vasileios, author.
Amsterdam : Morgan Kaufmann, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only