Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
Guardat en:
Autor principal: | Oktavianto, Digit |
---|---|
Altres autors: | Muhardianto, Iqbal |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Birmingham :
Packt Publishing,
2013.
|
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
Practical malware analysis the hands-on guide to dissecting malicious software /
per: Sikorski, Michael
Publicat: (2012)
per: Sikorski, Michael
Publicat: (2012)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
per: Ligh, Michael W.
Publicat: (2011)
per: Ligh, Michael W.
Publicat: (2011)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
per: Ligh, Michael Hale
Publicat: (2014)
per: Ligh, Michael Hale
Publicat: (2014)
Hacking exposed : malware and rootkits : security secrets & solutions /
per: Elisan, Christopher C., et al.
Publicat: (2017)
per: Elisan, Christopher C., et al.
Publicat: (2017)
Configuring Symantec Antivirus, Corporate Edition
Publicat: (2003)
Publicat: (2003)
Defense and detection strategies against Internet worms
per: Nazario, Jose
Publicat: (2004)
per: Nazario, Jose
Publicat: (2004)
Computer viruses and other malicious software a threat to the Internet economy.
Publicat: (2009)
Publicat: (2009)
Static analysis of software the abstract interpretation /
Publicat: (2012)
Publicat: (2012)
Software error detection through testing and analysis
per: Huang, J. C., 1935-
Publicat: (2009)
per: Huang, J. C., 1935-
Publicat: (2009)
Security modeling and analysis of mobile agent systems
per: Ma, Lu
Publicat: (2006)
per: Ma, Lu
Publicat: (2006)
User-centered requirements analysis /
per: Martin, Charles Fontaine, 1945-
Publicat: (1988)
per: Martin, Charles Fontaine, 1945-
Publicat: (1988)
Instant JRebel /
per: Lermitage, Jonathan
Publicat: (2013)
per: Lermitage, Jonathan
Publicat: (2013)
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
per: Buchanan, Steve
Publicat: (2013)
per: Buchanan, Steve
Publicat: (2013)
Viruses and human disease /
per: Strauss, James H.
Publicat: (2008)
per: Strauss, James H.
Publicat: (2008)
Viral fitness the next SARS and West Nile in the making /
per: Goudsmit, Jaap, 1951-
Publicat: (2004)
per: Goudsmit, Jaap, 1951-
Publicat: (2004)
Oacle Goldengate 11g implementer's guide design, install, and configure high-performance data replication solutions using Oracle GoldenGate /
per: Jeffries, John P. (John Parsons), b. 1815
Publicat: (2011)
per: Jeffries, John P. (John Parsons), b. 1815
Publicat: (2011)
Patterns model-driven development using IBM Rational Software Architect /
per: Swithinbank, Peter
Publicat: (2005)
per: Swithinbank, Peter
Publicat: (2005)
Software testing techniques finding the defects that matter /
Publicat: (2005)
Publicat: (2005)
Guide to advanced software testing
per: Hass, Anne Mette Jonassen
Publicat: (2008)
per: Hass, Anne Mette Jonassen
Publicat: (2008)
Continuous delivery and DevOps a quickstart guide /
per: Swartout, Paul
Publicat: (2012)
per: Swartout, Paul
Publicat: (2012)
Component-based software development case studies /
per: Lau, Kung-Kiu
Publicat: (2004)
per: Lau, Kung-Kiu
Publicat: (2004)
The software audit guide /
per: Helgeson, John W., 1945-
Publicat: (2009)
per: Helgeson, John W., 1945-
Publicat: (2009)
Coder to developer tools and strategies for delivering your software /
per: Gunderloy, Mike
Publicat: (2004)
per: Gunderloy, Mike
Publicat: (2004)
Mastering Pagemaker 5.0 for Windows /
per: Altman, Rebecca B.
Publicat: (1994)
per: Altman, Rebecca B.
Publicat: (1994)
The computer triangle : hardware, software, people /
per: Oakman, Robert L., 1941-
Publicat: (1995)
per: Oakman, Robert L., 1941-
Publicat: (1995)
Computers and information systems /
per: Szymanski, Robert A.
Publicat: (1995)
per: Szymanski, Robert A.
Publicat: (1995)
Introduction to computers and information systems with hands-on software tutorials /
Publicat: (1991)
Publicat: (1991)
Computers! /
per: Trainor, Timothy N., 1953-
Publicat: (1987)
per: Trainor, Timothy N., 1953-
Publicat: (1987)
Using aspect-oriented programming for trustworthy software development
per: Safonov, V. O. (Vladimir Olegovich)
Publicat: (2008)
per: Safonov, V. O. (Vladimir Olegovich)
Publicat: (2008)
Virus taxonomy classification and nomenclature of viruses : ninth report of the International Committee on Taxonomy of Viruses /
Publicat: (2012)
Publicat: (2012)
Matthews' plant virology
per: Matthews, R. E. F. (Richard Ellis Ford), 1921-
Publicat: (2002)
per: Matthews, R. E. F. (Richard Ellis Ford), 1921-
Publicat: (2002)
The evolution and emergence of RNA viruses
per: Holmes, Edward C.
Publicat: (2009)
per: Holmes, Edward C.
Publicat: (2009)
Test-driven development with Mockito /
per: Acharya, Sujoy
Publicat: (2013)
per: Acharya, Sujoy
Publicat: (2013)
Practical model-based testing a tools approach /
per: Utting, Mark
Publicat: (2006)
per: Utting, Mark
Publicat: (2006)
Achieving software quality through teamwork
per: Evans, Isabel
Publicat: (2004)
per: Evans, Isabel
Publicat: (2004)
Testing and quality assurance for component-based software
per: Gao, Jerry
Publicat: (2003)
per: Gao, Jerry
Publicat: (2003)
Metrics-driven enterprise software development effectively meeting evolving business needs /
per: Datta, Subhajit
Publicat: (2007)
per: Datta, Subhajit
Publicat: (2007)
Software estimation best practices, tools & techniques a complete guide for software project estimators /
per: Chemuturi, Murali, 1950-
Publicat: (2009)
per: Chemuturi, Murali, 1950-
Publicat: (2009)
Computer course (illustrated)
per: Singh, Vishnu P.
Publicat: (2010)
per: Singh, Vishnu P.
Publicat: (2010)
Software design methodology
per: Zhu, Hong, 1961-
Publicat: (2005)
per: Zhu, Hong, 1961-
Publicat: (2005)
Ítems similars
-
Practical malware analysis the hands-on guide to dissecting malicious software /
per: Sikorski, Michael
Publicat: (2012) -
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
per: Ligh, Michael W.
Publicat: (2011) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
per: Ligh, Michael Hale
Publicat: (2014) -
Hacking exposed : malware and rootkits : security secrets & solutions /
per: Elisan, Christopher C., et al.
Publicat: (2017) -
Configuring Symantec Antivirus, Corporate Edition
Publicat: (2003)