Anti-worm

Results: 47



#Item
31Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-05 13:14:30
32State of Arkansas Office of Information Technology Agency #[removed]West Capitol Avenue Suite 990

State of Arkansas Office of Information Technology Agency #[removed]West Capitol Avenue Suite 990

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:18
33Information_Security_and_You

Information_Security_and_You

Add to Reading List

Source URL: www.innismir.net

Language: English - Date: 2013-08-28 10:20:33
341  Spam Zombies And Inbound Flows To Compromised Customer Systems Joe St Sauver, Ph.D. ([removed]) MAAWG Senior Technical Advisor

1 Spam Zombies And Inbound Flows To Compromised Customer Systems Joe St Sauver, Ph.D. ([removed]) MAAWG Senior Technical Advisor

Add to Reading List

Source URL: darkwing.uoregon.edu

Language: English - Date: 2005-02-27 20:32:38
35A System Administrator’s Guide to Implementing Various Anti-Virus Mechanisms: What to do When a Virus is Suspected On a Computer Network Robert B. Fried, BS, MS Abstract This paper, presented in the form of sample guid

A System Administrator’s Guide to Implementing Various Anti-Virus Mechanisms: What to do When a Virus is Suspected On a Computer Network Robert B. Fried, BS, MS Abstract This paper, presented in the form of sample guid

Add to Reading List

Source URL: www.crime-scene-investigator.net

Language: English - Date: 2003-04-25 20:05:02
36Beware of Your Inbox! Beware of Your Inbox! Robert B. Fried, BS, MS Abstract This paper focuses on Internet and electronic mail based viruses and worms and how

Beware of Your Inbox! Beware of Your Inbox! Robert B. Fried, BS, MS Abstract This paper focuses on Internet and electronic mail based viruses and worms and how

Add to Reading List

Source URL: www.crime-scene-investigator.net

Language: English - Date: 2003-04-25 20:04:10
37Microsoft Word - SECURITY TERMS.doc

Microsoft Word - SECURITY TERMS.doc

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2007-08-17 18:53:40
38The City of New York CITYWIDE INFORMATION SECURITY POLICY Anti-Virus Security Policy The Policy City of New York computing resources must be protected from malicious software and viruses.

The City of New York CITYWIDE INFORMATION SECURITY POLICY Anti-Virus Security Policy The Policy City of New York computing resources must be protected from malicious software and viruses.

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2014-09-09 15:27:05
39How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-09-03 14:32:18
40What You Can Do About Junk E-mail.pmd

What You Can Do About Junk E-mail.pmd

Add to Reading List

Source URL: www.ag.state.mn.us

Language: English - Date: 2010-03-26 15:05:12