Search Results - "malware"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 22
- Computer crimes 19
- Computer networks 19
- Security measures 19
- investigation 8
- Malware (Computer software) 5
- Prevention 4
- Computer viruses 3
- Certification 2
- Cyberterrorism 2
- Data protection 2
- Digital forensic science 2
- Electronic data processing personnel 2
- Examinations 2
- Forensic sciences 2
- Hackers 2
- Investigation 2
- Mobile computing 2
- security measures 2
- Access control 1
- Automatic machinery 1
- Big data 1
- Blockchains (Databases) 1
- Business enterprises 1
- Cell phone systems 1
- Computer hackers 1
- Confidential communications 1
- Cyberspace 1
- Data mining 1
- Data processing 1
-
1
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
Published 2010“…Hacking exposed malware and rootkits.…”
Book -
2
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
Published 2011Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry…”
Book -
3
-
4
Malware forensics field guide for Linux systems digital forensics field guides
Published 2014Table of Contents: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.…”
Book -
5
Malware forensics field guide for Windows systems digital forensics field guides
Published 2012Subjects: “…Malware (Computer software)…”
Book -
6
A framework of determining the malware factor of suspicious files based on its behaviours
Published 2015Thesis Book -
7
-
8
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
Published 2014Subjects: “…Malware (Computer software)…”
Book -
9
-
10
Big data analytics with applications in insider threat detection
Published 2018Table of Contents: “…Introduction -- Data security and privacy -- Data mining techniques -- Data mining for security applications -- Cloud computing and semantic web technologies -- Data mining and insider threat detection -- Big data management and analytics technologies -- Challenges for stream data classification -- Survey of stream data classification -- A multi-partition, multi-chunk ensemble for classifying concept-drifting data streams -- Classification and novel class detection in concept-drifting data streams -- Data stream classification with limited labeled training data -- Directions in data stream classification -- Insider threat detection as a stream mining problem -- Survey of insider threat and stream mining -- Ensemble-based insider threat detection -- Details of learning classes -- Experiments and results for nonsequence data -- Insider threat detection for sequence data -- Experiments and results for sequence data -- Scalability using big data technologies -- Stream mining and big data for insider threat detection -- Cloud query processing system for big data management -- Big data analytics for multipurpose social media applications -- Big data management and cloud for assured information sharing -- Big data management for secure information integration -- Big data analytics for malware detection -- A semantic web-based inference controller for provenance big data -- Confidentiality, privacy, and trust for big data systems -- Unified framework for secure big data management and analytics -- Big data, security, and the internet of things -- Big data analytics for malware detection in smartphones -- Toward a case study in healthcare for big data analytics and security -- Toward an experimental infrastructure and education program for BDMA and BDSP -- Directions for BDSP and BDMA -- Summary and directions…”
Book -
11
-
12
Gray hat hacking the ethical hacker's handbook
Published 2011Table of Contents: “…Vulnerability analysis -- pt. 5. Malware analysis.…”
Book -
13
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
Published 2024Table of Contents: “…Automating Network Forensics -- 10.Backtracking Malware -- 11. Investigating Ransomware Attacks -- 12. …”
Book -
14
-
15
Hacking exposed mobile security secrets & solutions
Published 2013Table of Contents: “…The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.…”
Book -
16
CEH v9 Certified ethical hacker version 9 : study guide
Published 2016Table of Contents: “…Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment…”
Book -
17
-
18
-
19
Cybercrime and digital forensics an introduction
Published 2015Table of Contents: “…Computer Hackers and Hacking -- 3. Malware and Automated Computer Attacks -- 4. Digital Piracy and Intellectual Property Theft -- 5. …”
Book -
20
GSEC GIAC security essentials certification exam guide
Table of Contents: “…Vulnerability Control -- Ch 12. Malware -- Ch 13. Physical Security -- Ch 14. Wireless Technologies -- Ch 15. …”
Book


