Malware analysis

Results: 349



#Item
321Malware / Professional certification

Assessors Panel CREST Intrusion Analysis Syllabus Issued by

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2014-07-08 07:42:58
322CCIM / Professional certification / Standards / Malware

Assessors Panel CREST Intrusion Analysis & Incident Management Syllabus Issued by

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2014-07-08 07:42:58
323Computer virus / COM file / Dynamic-link library / Portable Executable / Library / Malware / Virus / Magic number / Jerusalem / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 A SHORT VISIT WITH A VIRUS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-05-01 13:37:19
324Computer security / Malware / Rootkits / Windows Registry / .sys / AVG / Dr. Web / System software / Software / Antivirus software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 THE CURSE OF NECURS, PART 2 Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-06-02 00:26:49
325Computing / Computer security / Rootkit / Windows Registry / Subst / System software / Malware / Cyberwarfare

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 THE CURSE OF NECURS, PART 1 Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-05-01 13:37:19
326Computing / Ada / Virus / NVIR / Malware / Java class file / Jerusalem / Ontario.2048 / Software / System software / Computer virus

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 GETTING ONE’S HANDS DIRTY Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2014-03-02 00:24:20
327Smartphones / Embedded Linux / Formal languages / Malware / Model theory / Dalvik / Pointer analysis / Data-flow analysis / String / Computing / Software / Android

Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation Shuying Liang, Andrew W. Keep, Matthew Might, Steven Lyde, Thomas Gilray, and Petey Aldous University of Utah

Add to Reading List

Source URL: matt.might.net

Language: English - Date: 2014-03-23 14:11:52
328Combinatorics on words / Formal languages / Discrete mathematics / Character encoding / String / Model theory / Permutation / Structure / Library / Mathematics / Data types / Primitive types

AnaDroid: Malware Analysis of Android with User-supplied Predicates Shuying Liang,1,2 Matthew Might1 School of Computing, University of Utah Salt Lake City, Utah, USA

Add to Reading List

Source URL: matt.might.net

Language: English - Date: 2014-03-23 14:11:52
329Computer security / Secure communication / Hacking / Military technology / Malware / Threat / National Security Agency / Data breach / Phishing / Computer network security / Security / Cyberwarfare

IBM Global Technology Services Managed Security Services IBM Security Services 2014 Cyber Security Intelligence Index Analysis of cyber attack and incident data from IBM’s worldwide

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-06-09 17:40:38
330Information technology management / System administration / Computer systems / Data security / Security information and event management / Antivirus software / Security event manager / Malware / Log analysis / Computing / Computer security / System software

RSA White Paper SIEM: Moving Beyond Compliance Dr. Anton Chuvakin @ Security Warrior Consulting

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2013-09-26 18:15:13
UPDATE