Your search returned 3 results.

Not what you expected? Check for suggestions
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
Evil by design : interaction design to lead us into temptation / Chris Nodder.

by Nodder, Chris.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: John Wiley, 2013Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: School of Art Design and Architecture (SADA)Call number: 006.7 NOD 2013 (1).
Designing data-intensive applications : the big ideas behind reliable, scalable, and maintainable systems / Martin Kleppmann.

by Kleppmann, Martin [author.].

Edition: First edition.Material type: Text Text; Format: print ; Literary form: Not fiction Copyright date: ©2017Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 280 SCB (1). Checked out (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.