Your search returned 2 results.

Sort
Results
1.
The Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory by
Material type: Text Text
Publication details: Indianapolis John wiley& Sons 2014
Other title:
  • Detecting Malware and Threats in Windows, Linux, and Mac Memory
Availability: Items available for loan: IIIT Kottayam Central Library (3)Collection, call number: 005.8 LIG/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 LIG/A. Not available: IIIT Kottayam Central Library: Checked out (1).

2.
Auditing IT Infrastructures for Compliance by Series: Information Systems Security & Assurance Series
Edition: 3rd Ed
Material type: Text Text
Publication details: Newyork Jones&Bartelett Learning 2024
Availability: Items available for loan: IIIT Kottayam Central Library (4)Collection, call number: 005.8 JOH/A, ... Items available for reference: IIIT Kottayam Central Library: Not For Loan (1)Collection, call number: 005.8 JOH/A.

Pages
IIIT Kottayam Logo       © IIIT Kottayam 2023. All rights reserved.