Viruses
epub |eng | 2022-02-15 | Author:Chad Maurice & Jeremy Thompson & William Copeland
Finally, the team turned to the success factors, MOPs, and MOEs. MOPs were defined by each section and supplied to the team lead for review. The team lead sent some ...
( Category:
Viruses
February 28,2024 )
epub |eng | 2022-01-15 | Author:Yuri Diogenes & Dr. Erdal Ozkaya
Use of clever tricks The use of clever tricks can help you defend your network against Nmap scanning. The Nmap scan tool, just like many other probe tools, relies on ...
( Category:
Viruses
January 20,2024 )
pdf | | 2023-10-27 | Author:Crawley, Kim;
( Category:
Viruses
January 20,2024 )
epub |eng | 2023-01-15 | Author:Kunal Sehgal & Nikolaos Thymianis
Detective controls These controls provide visibility into security breaches or any malicious or suspicious activity. Detective security controls function during the progression as well as after the occurrence of the ...
( Category:
Viruses
January 16,2024 )
epub |eng | 2023-09-11 | Author:Borg, Omar
Chapter 7.1: Incident Response and Remediation with Yara Rules In this expanded chapter, we will delve into the integration of Yara rules into your incident response and remediation processes using ...
( Category:
Viruses
January 8,2024 )
epub |eng | 2022-01-15 | Author:Kyle Wilhoit & Joseph Opacki
Hybrid collection Hybrid collection utilizes a combination of the passive data collection capabilities of an organization and active collection disciplines in the sense that it requires human interaction from the ...
( Category:
Viruses
January 6,2024 )
pdf | | 2024-10-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
( Category:
Viruses
December 4,2023 )
epub |eng | 2022-11-15 | Author:John Paul Mueller
Exploit: An exploit is a special piece of code or carefully crafted data that takes advantage of a bug, error, or behavior (intended or not) of an application, operating system, ...
( Category:
Viruses
November 30,2023 )
epub |eng | 2023-11-15 | Author:Paul Huijbregts & Joe Anich & Justen Graves
Email notifications Here, you can create email notifications for alerts or vulnerabilities. This is best used selectively; use cases can be for VIP machines or other high-value assets that you ...
( Category:
Viruses
November 27,2023 )
epub |eng | 2022-11-15 | Author:Mark Birch
Objdump This is a similar tool to Readelf in that it can display the contents of operating system files on Unix-like operating systems. Strace Strace is a tool for tracing ...
( Category:
Viruses
November 25,2023 )
epub, pdf |eng | 2024-11-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
Decrypting the Command-and-Control Communications As in the previous chapter, one of the most important properties of the malware weâll want to reverse engineer is its encrypted communication with the command-and-control ...
( Category:
Viruses
November 13,2023 )
epub |eng | 2023-11-15 | Author:Megan Roddie & Jason Deyalsingh & Gary J. Katz
Message Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: 2023-01-14 03:29:21.683 ProcessGuid: {71ccf5f5-2191-63c2-7303-000000001e00} ProcessId: 12852 PipeName: \RemCom_stdinCQHe2366530 Image: C:\Windows\HRrcwYpJ.exe User: NT AUTHORITY\SYSTEM Pipe Created: RuleName: Named Pipes EventType: CreatePipe UtcTime: ...
( Category:
Viruses
November 3,2023 )
epub |eng | 2023-09-14 | Author:Joshua Arvin Lat
( Category:
Viruses
October 30,2023 )
epub |eng | 2023-10-03 | Author:Dr. Ahmad MK Nasser
10.4.1 Design [WP-10-01] Cybersecurity specifications [WP-10-02] Cybersecurity requirements for post-development [WP-10-03] Documentation of the modeling, design, or programming languages and coding guidelines [WP-10-04] Verification report for the cybersecurity specifications [WP-10-05] ...
( Category:
Viruses
October 27,2023 )
pdf | | 2023-08-01 | Author:Yahia, Mostafa;
( Category:
Viruses
August 25,2023 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(6326)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6196)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(5895)
Machine Learning Security Principles by John Paul Mueller(5878)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5536)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5518)
Solidity Programming Essentials by Ritesh Modi(3835)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3481)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Future Crimes by Marc Goodman(3309)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3308)
Blockchain Basics by Daniel Drescher(3272)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3190)
Learn Computer Forensics - Second Edition by William Oettinger(2987)
Mobile App Reverse Engineering by Abhinav Mishra(2862)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2837)
The Code Book by Simon Singh(2772)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2759)
Incident Response with Threat Intelligence by Roberto Martínez(2679)
The Art Of Deception by Kevin Mitnick(2582)
