Search Results for Computer software. - Narrowed by: Malware (Computer software) SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Malware$002b$002528Computer$002bsoftware$002529$002509Malware$002b$002528Computer$002bsoftware$002529$0026ps$003d300?dt=list 2026-03-26T19:46:39Z Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware ent://SD_ILS/0/SD_ILS:1140471 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Monnappa K A, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5446050">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware diffusion models for modern complex networks : theory and applications ent://SD_ILS/0/SD_ILS:1108684 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Karyotis, Vasileios, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4438752">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory ent://SD_ILS/0/SD_ILS:1034100 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Ligh, Michael Hale, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1740753">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cuckoo malware analysis : analyze malware using Cuckoo Sandbox ent://SD_ILS/0/SD_ILS:1019253 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Oktavianto, Digit.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1389346">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware analyst's cookbook and dvd tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:972089 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Ligh, Michael W.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=624374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems digital forensics field guides ent://SD_ILS/0/SD_ILS:995189 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Malin, Cameron H.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=921016">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical malware analysis the hands-on guide to dissecting malicious software ent://SD_ILS/0/SD_ILS:1009972 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Sikorski, Michael.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137570">Click to View</a><br/>Format:&#160;Electronic Resources<br/> How to defeat advanced malware : new tools for protection and forensics ent://SD_ILS/0/SD_ILS:1042566 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Dalziel, Max, author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1888756">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A bug hunter's diary a guided tour through the wilds of software security ent://SD_ILS/0/SD_ILS:1009945 2026-03-26T19:46:39Z 2026-03-26T19:46:39Z by&#160;Klein, Tobias.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1137526">Click to View</a><br/>Format:&#160;Electronic Resources<br/>