Search Results - "malware"

Refine Results
  1. 1

    Hacking exposed malware & rootkits malware & rootkits security secrets & solutions by Davis, Michael A.

    Published 2010
    “…Hacking exposed malware and rootkits.…”
    Book
  2. 2

    Malware analyst's cookbook and DVD tools and techniques for fighting malicious code by Ligh, Michael Hale, Adair, Steven, Hartstein, Blake, Richard, Matthew

    Published 2011
    Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry…”
    Book
  3. 3

    Data mining tools for malware detection by Masud, Mehedy

    Published 2012
    Book
  4. 4

    Malware forensics field guide for Linux systems digital forensics field guides by Malin, Cameron H

    Published 2014
    Table of Contents: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.…”
    Book
  5. 5

    Malware forensics field guide for Windows systems digital forensics field guides by Malin, Cameron H.

    Published 2012
    Subjects: “…Malware (Computer software)…”
    Book
  6. 6

    A framework of determining the malware factor of suspicious files based on its behaviours by Nur Shamimi Che Anuar

    Published 2015
    Thesis Book
  7. 7
  8. 8

    The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory by Ligh, Michael Hale, Case, Andrew (Digital forensics researcher), Levy, Jamie, Walters, Aaron

    Published 2014
    Subjects: “…Malware (Computer software)…”
    Book
  9. 9
  10. 10

    Big data analytics with applications in insider threat detection by Thuraisingham, Bhavani, Parveen, Pallabi, Masud, Mohammad Mehedy, Khan, Latifur

    Published 2018
    Table of Contents: “…Introduction -- Data security and privacy -- Data mining techniques -- Data mining for security applications -- Cloud computing and semantic web technologies -- Data mining and insider threat detection -- Big data management and analytics technologies -- Challenges for stream data classification -- Survey of stream data classification -- A multi-partition, multi-chunk ensemble for classifying concept-drifting data streams -- Classification and novel class detection in concept-drifting data streams -- Data stream classification with limited labeled training data -- Directions in data stream classification -- Insider threat detection as a stream mining problem -- Survey of insider threat and stream mining -- Ensemble-based insider threat detection -- Details of learning classes -- Experiments and results for nonsequence data -- Insider threat detection for sequence data -- Experiments and results for sequence data -- Scalability using big data technologies -- Stream mining and big data for insider threat detection -- Cloud query processing system for big data management -- Big data analytics for multipurpose social media applications -- Big data management and cloud for assured information sharing -- Big data management for secure information integration -- Big data analytics for malware detection -- A semantic web-based inference controller for provenance big data -- Confidentiality, privacy, and trust for big data systems -- Unified framework for secure big data management and analytics -- Big data, security, and the internet of things -- Big data analytics for malware detection in smartphones -- Toward a case study in healthcare for big data analytics and security -- Toward an experimental infrastructure and education program for BDMA and BDSP -- Directions for BDSP and BDMA -- Summary and directions…”
    Book
  11. 11
  12. 12

    Gray hat hacking the ethical hacker's handbook

    Published 2011
    Table of Contents: “…Vulnerability analysis -- pt. 5. Malware analysis.…”
    Book
  13. 13

    Mastering Network Forensics : A practical approach to investigating and defending against network attacks / by Jaswal, Nipun

    Published 2024
    Table of Contents: “…Automating Network Forensics -- 10.Backtracking Malware -- 11. Investigating Ransomware Attacks -- 12. …”
    Book
  14. 14

    Information Security : Principles and Practice / by Stamp, Mark

    Published 2022
    Unknown
  15. 15

    Hacking exposed mobile security secrets & solutions by Bergman, Neil

    Published 2013
    Table of Contents: “…The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.…”
    Book
  16. 16

    CEH v9 Certified ethical hacker version 9 : study guide by Oriyano, Sean-Philip

    Published 2016
    Table of Contents: “…Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment…”
    Book
  17. 17

    Wireshark for security professionals using Wireshark and the Metasploit Framework by Bullock, Jessey, Gordon, Adam

    Published 2017
    Book
  18. 18

    Industrial cybersecurity efficiently secure critical infrastructure systems by Ackerman, Pascal

    Published 2017
    Book
  19. 19

    Cybercrime and digital forensics an introduction by Holt, Thomas J., 1978-, Bossler, Adam M., Seigfried-Spellar, Kathryn C.

    Published 2015
    Table of Contents: “…Computer Hackers and Hacking -- 3. Malware and Automated Computer Attacks -- 4. Digital Piracy and Intellectual Property Theft -- 5. …”
    Book
  20. 20

    GSEC GIAC security essentials certification exam guide by Messier, Ric

    Table of Contents: “…Vulnerability Control -- Ch 12. Malware -- Ch 13. Physical Security -- Ch 14. Wireless Technologies -- Ch 15. …”
    Book