Search Results - "malware"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 15
- Computer networks 6
- Security measures 5
- Computer crimes 3
- Investigation 3
- Computer hackers 2
- Examinations 2
- Forensic sciences 2
- Automatic machinery 1
- Certification 1
- Client/ server computing 1
- Computational intelligence 1
- Computer viruses 1
- Data protection 1
- Electronic data processing personnel 1
- Indentification 1
- Malware (computer software) 1
- Malware(Computer software) 1
- Microsoft software 1
- Process control 1
-
1
Malware forensics : investigating and analyzing malicious code
Published 2008Table of Contents: “…1. Malware incident response: volatile data collection and examination on a live windows system -- 2. …”
-
2
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
Published 2010“…Hacking exposed malware and rootkits…”
McGraw Hill
-
3
Malware Analyst's cookbook and dvd : tools and techniques for fighting malicious code
Published 2011Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.…”
-
4
Virtual honeypots : from botnet tracking to intrusion detection
Published 2008Table of Contents: “…Tracking botnets -- 12. Analyzing malware with CWsandbox…”
-
5
Gray hat hacking : the ethical hacker's handbook
Published 2011Table of Contents: “…Vulnerability analysis -- 5. Malware analysis…”
McGraw Hill
-
6
Unix and Linux forensic analysis DVD toolkit
Published 2008Table of Contents: “…The /Proc file systems -- 7. File analysis -- 8. Malware…”
-
7
Linux server security : hack and defend
Published 2016Table of Contents: “…Nmap's prodigious NSE -- 8. Malware detection -- 9. Password cracking with hashcat -- 10. …”
-
8
Computer security fundamentals
Published 2012Table of Contents: “…Denial of service attacks -- 5. Malware -- 6. Techniques used by hackers -- 7. Industrial espionage in cyberspace -- 8. …”
-
9
Computer security fundamentals
Published 2006Table of Contents: “…Denial of service attacks -- 5. Malware -- 6. Basics of assessing and securing a system -- 7. …”
-
10
Network security fundamentals : project manual
Published 2007Table of Contents: “…Server roles and security -- 9. Protecting againts malware -- 10. Ongoing security management -- 11. …”
-
11
Information security : principles and practice
Published 2011Table of Contents: “…Real-world security protocols -- 11. Software flaws and malware -- 12. Insecurity in software -- 13. Operating systems and security…”
-
12
Network forensics : tracking hackers through cyberspace
Published 2012Table of Contents: “…Network tunneling -- 12. Malware forensics…”
-
13
Microsoft Windows security : essentials
Published 2011Table of Contents: “…Understanding core security principles -- 2. Understanding malware and social engineering -- 3. Understanding user authentication -- 4. …”
-
14
CompTIA security + guide to network security fundamentals
-
15
Information security : foundations, technology and applications
Published 2018Table of Contents: “…Cybersecurity: timeline malware analysis and classification -- 11. Recent trends in the cryptanalysis of block ciphers -- 12. …”
-
16
Computational intelligence for privacy and security
Published 2012Table of Contents: “…Computational intelligent techniques and similarity measures for malware classification -- Intelligence techniques in computer security and forensics: at the boundaries of ethics and law…”
-
17
Computer and cyber security : principles, algorithm, applications, and perspectives
-
18