Rootkit

Results: 605



#Item
441Database / Computing / Rootkit / Cyberwarfare / Computer security / Security / Software patent / Patent law / Patentable subject matter / Computer data storage

Microsoft Word - THIRTIETH SERIES.doc

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2009-02-02 17:21:50
442Antivirus software / Avast! / Microsoft Security Essentials / Rootkit / Computer virus / Zlob trojan / Computer worm / Linux malware / MS Antivirus / Malware / System software / Software

Cyber Security Consumer Tip Sheet Protecting yourself from Malware Malware is a general term to describe destructive programs that can harm your computer or any other device that connects to the Internet, including smart

Add to Reading List

Source URL: www.cira.ca

Language: English - Date: 2013-01-08 14:32:28
443Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines

Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 21:55:17
444Computer security / Malware / Cyberwarfare / Two-factor authentication / Rootkit / Security / Password / Universal Serial Bus

USB Portable Storage Device Collaborative PP Work Plan

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-01-15 13:26:10
445Linux / Monolithic kernels / FreeBSD / Loadable kernel module / Rootkit / Linux kernel / Kernel / Integrity / Ring / Computer architecture / System software / Software

Tech Digest Figure Template_2 column_01-06-12

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:11:39
446Antivirus software / Malware / Computer network security / Rootkit / McAfee / Threat / Computer insecurity / Stuxnet / Crimeware / Computer security / Cyberwarfare / System software

Counter Stealth Malware Solution Guide

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:32
447Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 14:10:31
448Computer crimes / Malware / Computer security / Computer network security / Antivirus software / Phishing / Rootkit / Advanced persistent threat / Near field communication / Cybercrime / Espionage / Cyberwarfare

Microsoft Word[removed]January - Emerging Trends and Threats.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2013-01-28 13:56:46
449Antivirus software / Malware / Vulnerability / Rootkit / Data model / Spam / Computing / Internet / Computer security

THE MITRE CORPORATION THE MAECâ„¢ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

Add to Reading List

Source URL: maec.mitre.org

Language: English - Date: 2014-06-23 12:30:47
450Computer security / Electronics / Computer crimes / Malware / Android / Phishing / Network security / Rootkit / Internet privacy / Computing / Smartphones / Software

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:28
UPDATE