Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
I tiakina i:
Kaituhi matua: | Oktavianto, Digit |
---|---|
Ētahi atu kaituhi: | Muhardianto, Iqbal |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Birmingham :
Packt Publishing,
2013.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Practical malware analysis the hands-on guide to dissecting malicious software /
mā: Sikorski, Michael
I whakaputaina: (2012)
mā: Sikorski, Michael
I whakaputaina: (2012)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
mā: Ligh, Michael W.
I whakaputaina: (2011)
mā: Ligh, Michael W.
I whakaputaina: (2011)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
mā: Ligh, Michael Hale
I whakaputaina: (2014)
mā: Ligh, Michael Hale
I whakaputaina: (2014)
Hacking exposed : malware and rootkits : security secrets & solutions /
mā: Elisan, Christopher C., me ētahi atu.
I whakaputaina: (2017)
mā: Elisan, Christopher C., me ētahi atu.
I whakaputaina: (2017)
Configuring Symantec Antivirus, Corporate Edition
I whakaputaina: (2003)
I whakaputaina: (2003)
Defense and detection strategies against Internet worms
mā: Nazario, Jose
I whakaputaina: (2004)
mā: Nazario, Jose
I whakaputaina: (2004)
Computer viruses and other malicious software a threat to the Internet economy.
I whakaputaina: (2009)
I whakaputaina: (2009)
Static analysis of software the abstract interpretation /
I whakaputaina: (2012)
I whakaputaina: (2012)
Software error detection through testing and analysis
mā: Huang, J. C., 1935-
I whakaputaina: (2009)
mā: Huang, J. C., 1935-
I whakaputaina: (2009)
Security modeling and analysis of mobile agent systems
mā: Ma, Lu
I whakaputaina: (2006)
mā: Ma, Lu
I whakaputaina: (2006)
User-centered requirements analysis /
mā: Martin, Charles Fontaine, 1945-
I whakaputaina: (1988)
mā: Martin, Charles Fontaine, 1945-
I whakaputaina: (1988)
Instant JRebel /
mā: Lermitage, Jonathan
I whakaputaina: (2013)
mā: Lermitage, Jonathan
I whakaputaina: (2013)
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
mā: Buchanan, Steve
I whakaputaina: (2013)
mā: Buchanan, Steve
I whakaputaina: (2013)
Viral fitness the next SARS and West Nile in the making /
mā: Goudsmit, Jaap, 1951-
I whakaputaina: (2004)
mā: Goudsmit, Jaap, 1951-
I whakaputaina: (2004)
Viruses and human disease /
mā: Strauss, James H.
I whakaputaina: (2008)
mā: Strauss, James H.
I whakaputaina: (2008)
Oacle Goldengate 11g implementer's guide design, install, and configure high-performance data replication solutions using Oracle GoldenGate /
mā: Jeffries, John P. (John Parsons), b. 1815
I whakaputaina: (2011)
mā: Jeffries, John P. (John Parsons), b. 1815
I whakaputaina: (2011)
Patterns model-driven development using IBM Rational Software Architect /
mā: Swithinbank, Peter
I whakaputaina: (2005)
mā: Swithinbank, Peter
I whakaputaina: (2005)
Software testing techniques finding the defects that matter /
I whakaputaina: (2005)
I whakaputaina: (2005)
Component-based software development case studies /
mā: Lau, Kung-Kiu
I whakaputaina: (2004)
mā: Lau, Kung-Kiu
I whakaputaina: (2004)
Guide to advanced software testing
mā: Hass, Anne Mette Jonassen
I whakaputaina: (2008)
mā: Hass, Anne Mette Jonassen
I whakaputaina: (2008)
Continuous delivery and DevOps a quickstart guide /
mā: Swartout, Paul
I whakaputaina: (2012)
mā: Swartout, Paul
I whakaputaina: (2012)
The software audit guide /
mā: Helgeson, John W., 1945-
I whakaputaina: (2009)
mā: Helgeson, John W., 1945-
I whakaputaina: (2009)
Computers and information systems /
mā: Szymanski, Robert A.
I whakaputaina: (1995)
mā: Szymanski, Robert A.
I whakaputaina: (1995)
Introduction to computers and information systems with hands-on software tutorials /
I whakaputaina: (1991)
I whakaputaina: (1991)
The computer triangle : hardware, software, people /
mā: Oakman, Robert L., 1941-
I whakaputaina: (1995)
mā: Oakman, Robert L., 1941-
I whakaputaina: (1995)
Mastering Pagemaker 5.0 for Windows /
mā: Altman, Rebecca B.
I whakaputaina: (1994)
mā: Altman, Rebecca B.
I whakaputaina: (1994)
Computers! /
mā: Trainor, Timothy N., 1953-
I whakaputaina: (1987)
mā: Trainor, Timothy N., 1953-
I whakaputaina: (1987)
Coder to developer tools and strategies for delivering your software /
mā: Gunderloy, Mike
I whakaputaina: (2004)
mā: Gunderloy, Mike
I whakaputaina: (2004)
Using aspect-oriented programming for trustworthy software development
mā: Safonov, V. O. (Vladimir Olegovich)
I whakaputaina: (2008)
mā: Safonov, V. O. (Vladimir Olegovich)
I whakaputaina: (2008)
Virus taxonomy classification and nomenclature of viruses : ninth report of the International Committee on Taxonomy of Viruses /
I whakaputaina: (2012)
I whakaputaina: (2012)
The evolution and emergence of RNA viruses
mā: Holmes, Edward C.
I whakaputaina: (2009)
mā: Holmes, Edward C.
I whakaputaina: (2009)
Matthews' plant virology
mā: Matthews, R. E. F. (Richard Ellis Ford), 1921-
I whakaputaina: (2002)
mā: Matthews, R. E. F. (Richard Ellis Ford), 1921-
I whakaputaina: (2002)
Test-driven development with Mockito /
mā: Acharya, Sujoy
I whakaputaina: (2013)
mā: Acharya, Sujoy
I whakaputaina: (2013)
Achieving software quality through teamwork
mā: Evans, Isabel
I whakaputaina: (2004)
mā: Evans, Isabel
I whakaputaina: (2004)
Testing and quality assurance for component-based software
mā: Gao, Jerry
I whakaputaina: (2003)
mā: Gao, Jerry
I whakaputaina: (2003)
Practical model-based testing a tools approach /
mā: Utting, Mark
I whakaputaina: (2006)
mā: Utting, Mark
I whakaputaina: (2006)
Metrics-driven enterprise software development effectively meeting evolving business needs /
mā: Datta, Subhajit
I whakaputaina: (2007)
mā: Datta, Subhajit
I whakaputaina: (2007)
Software estimation best practices, tools & techniques a complete guide for software project estimators /
mā: Chemuturi, Murali, 1950-
I whakaputaina: (2009)
mā: Chemuturi, Murali, 1950-
I whakaputaina: (2009)
Computer course (illustrated)
mā: Singh, Vishnu P.
I whakaputaina: (2010)
mā: Singh, Vishnu P.
I whakaputaina: (2010)
Les maladies emergentes : Zika, Ebola, chikungunya ... Comprendre ces infections et les prevenir au quotidien /
mā: Braly, Jean-Philippe, me ētahi atu.
I whakaputaina: (2016)
mā: Braly, Jean-Philippe, me ētahi atu.
I whakaputaina: (2016)
Ngā tūemi rite
-
Practical malware analysis the hands-on guide to dissecting malicious software /
mā: Sikorski, Michael
I whakaputaina: (2012) -
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
mā: Ligh, Michael W.
I whakaputaina: (2011) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
mā: Ligh, Michael Hale
I whakaputaina: (2014) -
Hacking exposed : malware and rootkits : security secrets & solutions /
mā: Elisan, Christopher C., me ētahi atu.
I whakaputaina: (2017) -
Configuring Symantec Antivirus, Corporate Edition
I whakaputaina: (2003)