Tipo | Título | Autor | Edición | Disponibilidad | Valoración |
---|---|---|---|---|---|
Libro |
Computer viruses, worms, data diddlers, killer programs and other threats to your system: What they are, how they work, and how to defend your PC, Mac, or Mainframe | McAfee, John |
(1989) |
Domicilio
|
---------- |
Libro |
Malware forensics: investigating and analyzing malicious code | Aquilina, James M. |
1a ed.
(c2008) |
Domicilio
|
---------- |
Libro |
Practical binary analysis: build your own Linux tools for binary instrumentation, analysis, and disassembly | Andriesse, Dennis |
(2019) |
Domicilio
|
---------- |
Libro |
Practical malware analysis: the hands-on guide to dissecting malicious software | Sikorski, Michael |
(2012) |
Domicilio
|
---------- |
Libro |
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System | Blunden, Bill |
2nd. ed.
(2012) |
Domicilio
|
---------- |
Libro |
Virus en las computadoras | Ferreyra Cortés, Gonzalo |
2a ed.
(1992) |
Domicilio
|
---------- |