Showing
1 - 4
results of
4
Skip to content
Institutional Login
Language
English
Te reo Māori
Books & media
Combined Results
Books & media
Articles & more
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Page will reload when a filter is removed.
Applied Filters:
Location:
Remove Filter
Online
Suggested Topics:
Remove Filter
Computer security
AND
Remove Filter
Malware (Computer software)
AND
Remove Filter
Prevention
Page will reload when a filter is removed.
Show filters (4)
Location:
Remove Filter
Online
Suggested Topics:
Remove Filter
Computer security
AND
Remove Filter
Malware (Computer software)
AND
Remove Filter
Prevention
Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
Computer security
Malware (Computer software)
Prevention
Computer crimes
2
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Honeypot frameworks and their applications : a new framework /
by
Ng, Chee Keong
,
Pan, Lei
,
Xiang, Yang (Computer scientist)
Published 2018
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 2
2
Cyber malware : offensive and defensive systems /
by
Almomani, Iman
,
Maglaras, Leandros
,
Ferrag, Mohamed Amine, 1987-
,
Ayres, Nick
Published 2024
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 3
3
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks /
by
Hassan, Nihad A.
Published 2019
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 4
4
The ransomware threat landscape : prepare for, recognise and survive ransomware attacks /
by
Calder, Alan, 1957-
Published 2021
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
–
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Location
Online
Item type
Ebook
4 results
4
Year of Publication
From:
To:
Items from Articles & more search
Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security
by
Thapliyal, Nachiket
, et al.
Visual Analysis of Computer Security Data Using Artificial Neural Networks
by
Zhernova, Ksenia
, et al.
Application of Computer Security Management in Internet Finance
by
Yu, Zhibin
Teaching Computer Security in a Secondary School
by
Mottl, J.
Design of Computer Security Algorithm Based on Differential Evolution and Analysis of Data Structure Discreteness
by
Chen, Xiaohai
, et al.
More results…