Your search returned 4 results.

Sort
Results
1.
Managed code rootkits hooking into runtime environments by
  • Metula, Erez
Publication details: Amsterdam Elsevier 2011
Availability: Items available for loan: University Library (1)Call number: 004.491 MET.

2.
Handbook of security and networks ed. by Yang Xiao, Frank H Li and Hui Chen by
  • Xiao, Yang; ed [ed. by.]
  • Li, Frank H; ed. by
  • Chen, Hui, ed.by
Publication details: Singapore World Scientific Publishing 2011
Availability: Items available for loan: University Library (1)Call number: 004.72.056.523 XIA.

3.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
  • Ligh, Michael Hale
  • Case, Andrew
  • Levy, Jamie
  • Walters, Aaron
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi: Wiley India, 2014
Availability: Items available for loan: Department of Computer Science (1)Call number: 004.056 LIG.

4.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by
  • Ligh, Michael Hale
  • Case, Andrew
  • Levy, Jamie
  • Walters, Aaron
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: New Delhi: Wiley India, 2014
Availability: No items available.

Pages

University Library
Cochin University of Science and Technology
Kochi-682 022, Kerala, India