1. Android Malware and Analysis
Author: / Dunham, Ken
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING
Classification :
E-BOOK

2. Bigelow's virus troubleshooting pocket reference
Author: Dunham, Ken
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Handbooks, manuals, etc ، Computer viruses
Classification :
QA
76
.
76
.
C68
.
D86
2000


3. Malicious Bots
Author: / Ken Dunham, Jim Melnick.,دانهام,Dunham
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: جرایم کامپیوتری,اینترنت , -- نمونهپژوهی
Classification :
HV
۶۷۷۳
/
د
۲
م
۲ ۱۳۸۷


4. Malicious bots :
Author: Ken Dunham and Jim Melnick.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes, Case studies.,Internet.,Computer crimes.,Internet.
Classification :
HV6773
.
D86
2009


5. Malicious bots: an inside look into the cyber-criminal underground of the internet
Author: / Ken Dunham and Jim Melnick
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer crimes,Internet,-- Case studies
Classification :
364
.
168
D917M
2009


6. Mobile malware attacks and defense
Author: / Ken Dunham, technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cell phone systems--Security measures,Mobile communication systems--Security measures,Mobile computing--Security measures,Computer crimes--Prevention,Computer crimes--Case studies,Hackers.,Wireless Internet--Security measures
Classification :
TK
,
5102
.
85
,.
M62
,
2009

