Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Subjects (1-24 of 24)
Malware Computer Software
1
Electronic Book
 

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
2
Print Material
 

Best practices for continuity of operations (handling destructive malware)



[Washington, D.C.] : Homeland Security, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 2.2:M 29    ---  Available
3
Electronic Book
 

Cuckoo malware analysis : analyze malware using Cuckoo Sandbox


Oktavianto, Digit.
Birmingham : Packt Publishing, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
4
Electronic Book
 

Cyberterrorism after Stuxnet


Chen, Thomas M., author.
Carlisle Barracks, PA : Strategic Studies Institute and U.S. Army War College Press, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146:C 99/3    ---  Available
5
ElectronicResource GovDoc
 

Examining the cyber threat to critical infrastructure and the American economy hearing before the Su


United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.
Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.H 75:112-11    ---  Available
6
Electronic Book
 

How to defeat advanced malware : new tools for protection and forensics


Dalziel, Max, author.
Waltham, Massachusetts : Syngress, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
7
Electronic Book
 

Illicit IT : bankrolling Kim Jong Un : hearing before the Subcommittee Indo-Pacific of the Committee


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Indo-Pacific, author.
Washington : U.S. Government Publishing Office, 2024. 2024

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:118-44    ---  Available
8
Electronic Book
 

Justice Department's evolving efforts on ransomware.


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2022- 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
9
Electronic Book
 

Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate W


Monnappa K A, author.
Birmingham ; Mumbai : Packt, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
10
Electronic Book
 

Malware analyst's cookbook and dvd tools and techniques for fighting malicious code


Ligh, Michael W.
Indianapolis, Ind. : Wiley Pub., Inc, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
11
Electronic Book
 

Malware diffusion models for modern complex networks : theory and applications


Karyotis, Vasileios, author.
Amsterdam : Morgan Kaufmann, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
12
Electronic Book
 

Malware forensics field guide for Windows systems : digital forensics field guides


Malin, Cameron H.
Waltham, MA : Syngress, ©2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
13
Electronic Book
 

Practical malware analysis the hands-on guide to dissecting malicious software


Sikorski, Michael.
San Francisco : No Starch Press, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Malware Computer Software Prevention
14
Electronic Book
 

Seven deadliest social network attacks


Timm, Carl.
Burlington, MA : Syngress/Elsevier, ©2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Malware Computer Software United States
15
Electronic Book
 

DHS can better mitigate the risks associated with malware, ransomware, and phishing attacks


United States. Department of Homeland Security. Office of Inspector General, author.
[Washington, D.C.] : U.S. Department of Homeland Security, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HS 1.22:22-62    ---  Available
16
Electronic Book
 

Ransomware: federal coordination and assistance challenges


United States. Government Accountability Office, author.
Washington, DC : U.S. Government Accountability Office, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
Malware Computer Software United States Prevention
17
Electronic Book
 

Cyber security, 2010 : hearings before the Committee on Homeland Security and Governmental Affairs,


United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs.
Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.G 74/9:S.HRG.111-1103    ---  Available
Mam Indians
18
Print Material
 

The two crosses of Todos Santos, survivals of Mayan religious ritual.


Oakes, Maud, 1903-1990.
[New York] Pantheon Books [1951] 1951

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  970.62 Oa4t    ---  Available
Mam Indians Mexico Ethnic Identity
19
Electronic Book
 

Histories and stories from Chiapas border identities in Southern Mexico


Hernandez Castillo, Rosalva Aida.
Austin : University of Texas Press, 2001. 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Mam Indians Religion
20
Electronic Book
 

Re-enchanting the world Maya Protestantism in the Guatemalan highlands


Samson, C. Mathews., 1960-
Tuscaloosa : University of Alabama Press, c2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
21
Electronic Book
 

Re-enchanting the world : Maya Protestantism in the Guatemalan highlands


Samson, C. Mathews, 1960- author.
Tuscaloosa : University of Alabama Press, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ACLS Humanities E-Book  Electronic Book    ---  Available
Mam Indians Social Conditions
22
Electronic Book
 

Re-enchanting the world Maya Protestantism in the Guatemalan highlands


Samson, C. Mathews., 1960-
Tuscaloosa : University of Alabama Press, c2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
23
Electronic Book
 

Re-enchanting the world : Maya Protestantism in the Guatemalan highlands


Samson, C. Mathews, 1960- author.
Tuscaloosa : University of Alabama Press, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ACLS Humanities E-Book  Electronic Book    ---  Available
Mam Language Acquisition
24
Electronic Book
 

The comparative method of language acquisition research


Pye, Clifton, author.
Chicago ; London : The University of Chicago Press, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only