Mostrando 1 - 20 Resultados de 290 Para Buscar '"malware"', tiempo de consulta: 0.29s Limitar resultados
  1. 1
  2. 2
  3. 3
    por Oktavianto, Digit
    Publicado 2013
    “…This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. …”
    Enlace del recurso
  4. 4
    por Dunham, Ken
    Publicado 2014
    “…The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. …”
    Enlace del recurso
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
    “…Malware concealment is the predominant strategy for malware propagation. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 14
    “…Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. …”
    Enlace del recurso
  15. 15
    por Kumar, Rajesh, Subbiah, Geetha
    Publicado 2022
    “…Software products from all vendors have vulnerabilities that can cause a security concern. Malware is used as a prime exploitation tool to exploit these vulnerabilities. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
    “…As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS