Malware Analyst's cookbook and dvd tools and techniques for fighting malicious code
| Main Authors: | Ligh, Michael W. (Author), Ligh, Michael Hale (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indiana
Wiley Publishing
c2011
|
| Subjects: |
Similar Items
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008)
by: Aquilina, James M., et al.
Published: (2008)
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, M. A. (Michael A.), et al.
Published: (2010)
by: Davis, M. A. (Michael A.), et al.
Published: (2010)
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003)
by: Ballard, Jason 1974-, et al.
Published: (2003)
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010)
by: Merkow, Mark S., et al.
Published: (2010)
Spyware and adware
by: Aycock, John
Published: (2011)
by: Aycock, John
Published: (2011)
Secure software design
by: Richardson, Theodor, et al.
Published: (2013)
by: Richardson, Theodor, et al.
Published: (2013)
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012)
by: Merkow, Mark S., et al.
Published: (2012)
Hunting security bugs
by: Gallagher, Tom, et al.
Published: (2006)
by: Gallagher, Tom, et al.
Published: (2006)
Fuzzing for software security testing and quality assurance
by: Takanen, Ari, et al.
Published: (2008)
by: Takanen, Ari, et al.
Published: (2008)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Security patch management
by: Nicastro, Felicia M.
Published: (2011)
by: Nicastro, Felicia M.
Published: (2011)
Virtualization security protecting virtualized environments
by: Shackleford, Dave
Published: (2013)
by: Shackleford, Dave
Published: (2013)
Security software development assessing and managing security risks
by: Ashbaugh, Douglas A.
Published: (2009)
by: Ashbaugh, Douglas A.
Published: (2009)
Optimizing ieee 802.11i resource and security essentials for mobile and stationary devices
by: Naraei, Parisa, et al.
Published: (2015)
by: Naraei, Parisa, et al.
Published: (2015)
Software testing and analysis process, principles, and techniques
by: Pezze, Mauro, et al.
Published: (2008)
by: Pezze, Mauro, et al.
Published: (2008)
Reversing secrets of reverse engineering
Software estimation best practices, tools & techniques a complete guide for software project estimators
by: Chemuturi, Murali 1950-
Published: (2009)
by: Chemuturi, Murali 1950-
Published: (2009)
Software requirements & specifications a lexicon of practice, principles and prejudices
by: Jackson, Michael J. (Michael James)
Published: (1995)
by: Jackson, Michael J. (Michael James)
Published: (1995)
Compiler design principles, techniques and tools
Hacker techniques, tools, and incident handling
by: Oriyano, Sean-Philip, et al.
by: Oriyano, Sean-Philip, et al.
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Software ecosystem understaning an indispensable technology and industry
by: Messerschmitt, David G., et al.
Published: (2007)
by: Messerschmitt, David G., et al.
Published: (2007)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Generating software from specifications
by: Waite, W. M. (William McCastline), et al.
Published: (2006)
by: Waite, W. M. (William McCastline), et al.
Published: (2006)
Thor's Microsoft security bible a collection of practical security techniques
by: Mullen, Timothy M.
Published: (2011)
by: Mullen, Timothy M.
Published: (2011)
Know all about software [ types, architecture, quality, development & engineering
by: Osborn, Temeka
Published: (2014)
by: Osborn, Temeka
Published: (2014)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
CGI/Perl cookbook
by: Patchett, Craig, et al.
Published: (1998)
by: Patchett, Craig, et al.
Published: (1998)
Software defect prevention concepts and implementation
by: Kane, Shridhar, et al.
Published: (2003)
by: Kane, Shridhar, et al.
Published: (2003)
Software product line engineering foundations, principles, and techniques
by: Pohl, Klaus 1960-, et al.
Published: (2005)
by: Pohl, Klaus 1960-, et al.
Published: (2005)
How to break Web software functional and security testing of Web applications and Web services
by: Andrei, Marcello, et al.
Published: (2006)
by: Andrei, Marcello, et al.
Published: (2006)
Software requirements styles and techniques
by: Lauesen, Soren
Published: (2002)
by: Lauesen, Soren
Published: (2002)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Practical PC
by: Parsons, June Jamrich, et al.
Published: (2008)
by: Parsons, June Jamrich, et al.
Published: (2008)
The practical PC
by: Parsons, June Jamrich, et al.
Published: (2006)
by: Parsons, June Jamrich, et al.
Published: (2006)
Using computers
by: Dologite, D. G. (Dorothy G.) 1941-
Published: (1987)
by: Dologite, D. G. (Dorothy G.) 1941-
Published: (1987)
Peter Norton's introduction to computers
by: Norton, Peter 1943-
Published: (1995)
by: Norton, Peter 1943-
Published: (1995)
Computers and information systems
by: Szymanski, Robert A., et al.
Published: (1995)
by: Szymanski, Robert A., et al.
Published: (1995)
Computers concepts and applications for users
by: Nickerson, Robert C. 1946-
Published: (1992)
by: Nickerson, Robert C. 1946-
Published: (1992)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Similar Items
-
Malware forensics investigating and analyzing malicious code
by: Aquilina, James M., et al.
Published: (2008) -
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, M. A. (Michael A.), et al.
Published: (2010) -
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003) -
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010) -
Spyware and adware
by: Aycock, John
Published: (2011)