Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
Enregistré dans:
Auteur principal: | Oktavianto, Digit |
---|---|
Autres auteurs: | Muhardianto, Iqbal |
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Birmingham :
Packt Publishing,
2013.
|
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Practical malware analysis the hands-on guide to dissecting malicious software /
par: Sikorski, Michael
Publié: (2012)
par: Sikorski, Michael
Publié: (2012)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
par: Ligh, Michael W.
Publié: (2011)
par: Ligh, Michael W.
Publié: (2011)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
par: Ligh, Michael Hale
Publié: (2014)
par: Ligh, Michael Hale
Publié: (2014)
Hacking exposed : malware and rootkits : security secrets & solutions /
par: Elisan, Christopher C., et autres
Publié: (2017)
par: Elisan, Christopher C., et autres
Publié: (2017)
Configuring Symantec Antivirus, Corporate Edition
Publié: (2003)
Publié: (2003)
Defense and detection strategies against Internet worms
par: Nazario, Jose
Publié: (2004)
par: Nazario, Jose
Publié: (2004)
Computer viruses and other malicious software a threat to the Internet economy.
Publié: (2009)
Publié: (2009)
Static analysis of software the abstract interpretation /
Publié: (2012)
Publié: (2012)
Software error detection through testing and analysis
par: Huang, J. C., 1935-
Publié: (2009)
par: Huang, J. C., 1935-
Publié: (2009)
Security modeling and analysis of mobile agent systems
par: Ma, Lu
Publié: (2006)
par: Ma, Lu
Publié: (2006)
User-centered requirements analysis /
par: Martin, Charles Fontaine, 1945-
Publié: (1988)
par: Martin, Charles Fontaine, 1945-
Publié: (1988)
Instant JRebel /
par: Lermitage, Jonathan
Publié: (2013)
par: Lermitage, Jonathan
Publié: (2013)
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
par: Buchanan, Steve
Publié: (2013)
par: Buchanan, Steve
Publié: (2013)
Oacle Goldengate 11g implementer's guide design, install, and configure high-performance data replication solutions using Oracle GoldenGate /
par: Jeffries, John P. (John Parsons), b. 1815
Publié: (2011)
par: Jeffries, John P. (John Parsons), b. 1815
Publié: (2011)
Patterns model-driven development using IBM Rational Software Architect /
par: Swithinbank, Peter
Publié: (2005)
par: Swithinbank, Peter
Publié: (2005)
Guide to advanced software testing
par: Hass, Anne Mette Jonassen
Publié: (2008)
par: Hass, Anne Mette Jonassen
Publié: (2008)
Component-based software development case studies /
par: Lau, Kung-Kiu
Publié: (2004)
par: Lau, Kung-Kiu
Publié: (2004)
Continuous delivery and DevOps a quickstart guide /
par: Swartout, Paul
Publié: (2012)
par: Swartout, Paul
Publié: (2012)
Software testing techniques finding the defects that matter /
Publié: (2005)
Publié: (2005)
The software audit guide /
par: Helgeson, John W., 1945-
Publié: (2009)
par: Helgeson, John W., 1945-
Publié: (2009)
Coder to developer tools and strategies for delivering your software /
par: Gunderloy, Mike
Publié: (2004)
par: Gunderloy, Mike
Publié: (2004)
The computer triangle : hardware, software, people /
par: Oakman, Robert L., 1941-
Publié: (1995)
par: Oakman, Robert L., 1941-
Publié: (1995)
Computers and information systems /
par: Szymanski, Robert A.
Publié: (1995)
par: Szymanski, Robert A.
Publié: (1995)
Introduction to computers and information systems with hands-on software tutorials /
Publié: (1991)
Publié: (1991)
Computers! /
par: Trainor, Timothy N., 1953-
Publié: (1987)
par: Trainor, Timothy N., 1953-
Publié: (1987)
Mastering Pagemaker 5.0 for Windows /
par: Altman, Rebecca B.
Publié: (1994)
par: Altman, Rebecca B.
Publié: (1994)
Viruses and human disease /
par: Strauss, James H.
Publié: (2008)
par: Strauss, James H.
Publié: (2008)
Viral fitness the next SARS and West Nile in the making /
par: Goudsmit, Jaap, 1951-
Publié: (2004)
par: Goudsmit, Jaap, 1951-
Publié: (2004)
Using aspect-oriented programming for trustworthy software development
par: Safonov, V. O. (Vladimir Olegovich)
Publié: (2008)
par: Safonov, V. O. (Vladimir Olegovich)
Publié: (2008)
Test-driven development with Mockito /
par: Acharya, Sujoy
Publié: (2013)
par: Acharya, Sujoy
Publié: (2013)
Practical model-based testing a tools approach /
par: Utting, Mark
Publié: (2006)
par: Utting, Mark
Publié: (2006)
Testing and quality assurance for component-based software
par: Gao, Jerry
Publié: (2003)
par: Gao, Jerry
Publié: (2003)
Achieving software quality through teamwork
par: Evans, Isabel
Publié: (2004)
par: Evans, Isabel
Publié: (2004)
Software estimation best practices, tools & techniques a complete guide for software project estimators /
par: Chemuturi, Murali, 1950-
Publié: (2009)
par: Chemuturi, Murali, 1950-
Publié: (2009)
Metrics-driven enterprise software development effectively meeting evolving business needs /
par: Datta, Subhajit
Publié: (2007)
par: Datta, Subhajit
Publié: (2007)
Computer course (illustrated)
par: Singh, Vishnu P.
Publié: (2010)
par: Singh, Vishnu P.
Publié: (2010)
Software design methodology
par: Zhu, Hong, 1961-
Publié: (2005)
par: Zhu, Hong, 1961-
Publié: (2005)
VMware ThinApp 4.7 essentials learn how to quickly and efficiently virtualize you applications with ThinApp 4.7 /
par: Björk, Peter
Publié: (2012)
par: Björk, Peter
Publié: (2012)
Drupal Rules how-to discover the power of the Rules framework to turn your Drupal 7 installation into an action-based, interactive application /
par: Varkonyi, Robert
Publié: (2012)
par: Varkonyi, Robert
Publié: (2012)
Mirror worlds, or, The day software puts the universe in a shoebox how it will happen and what it will mean /
par: Gelernter, David Hillel
Publié: (1991)
par: Gelernter, David Hillel
Publié: (1991)
Documents similaires
-
Practical malware analysis the hands-on guide to dissecting malicious software /
par: Sikorski, Michael
Publié: (2012) -
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
par: Ligh, Michael W.
Publié: (2011) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
par: Ligh, Michael Hale
Publié: (2014) -
Hacking exposed : malware and rootkits : security secrets & solutions /
par: Elisan, Christopher C., et autres
Publié: (2017) -
Configuring Symantec Antivirus, Corporate Edition
Publié: (2003)