Rootkit

Results: 605



#Item
481NEW CRIMINAL POTENTIAL– ANDROID ROOTKIT Alexandru Negrila 1 Abstract Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the

NEW CRIMINAL POTENTIAL– ANDROID ROOTKIT Alexandru Negrila 1 Abstract Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the

Add to Reading List

Source URL: plagiarism.repec.org

Language: English - Date: 2011-12-14 03:13:49
482Microsoft Word - NewRelic - Using APM for Security.docx

Microsoft Word - NewRelic - Using APM for Security.docx

Add to Reading List

Source URL: try.newrelic.com

Language: English - Date: 2014-08-23 13:28:59
483

PDF Document

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2008-12-03 09:21:20
484

PDF Document

Add to Reading List

Source URL: www.eba.europa.eu

Language: English - Date: 2012-01-02 19:00:00
485Cyber Reference Aid  The purpose of this Cyber Reference Aid is to illustrate the various phases of an attack and to define some of the more common cyber threat terms. Cyber Attack Cycle Testing and Compromise - Prior to

Cyber Reference Aid The purpose of this Cyber Reference Aid is to illustrate the various phases of an attack and to define some of the more common cyber threat terms. Cyber Attack Cycle Testing and Compromise - Prior to

Add to Reading List

Source URL: www.state.tn.us

Language: English - Date: 2013-10-09 14:04:37
486Introduction to Qubes OS bhyvecon Tokyo 2014 @ntddk  Self-introduction

Introduction to Qubes OS bhyvecon Tokyo 2014 @ntddk Self-introduction

Add to Reading List

Source URL: bhyvecon.org

Language: English - Date: 2014-03-13 06:01:03
487Setup For Failure: Defeating Secure Boot Corey Kallenberg Sam Cornwell Xeno Kovah John Butterworth

Setup For Failure: Defeating Secure Boot Corey Kallenberg Sam Cornwell Xeno Kovah John Butterworth

Add to Reading List

Source URL: haxpo.nl

Language: English - Date: 2014-08-04 20:17:02
488C O U R S E  C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2013-09-16 10:47:33
489A Survey of USB Exploit Mechanisms, profiling Stuxnet and the possible adaptive measures that could have made it more effective. Kevin Orrey, MSc Abstract Universal Serial Bus, (USB), is today’s ubiquitous mechanism fo

A Survey of USB Exploit Mechanisms, profiling Stuxnet and the possible adaptive measures that could have made it more effective. Kevin Orrey, MSc Abstract Universal Serial Bus, (USB), is today’s ubiquitous mechanism fo

Add to Reading List

Source URL: www.vulnerabilityassessment.co.uk

Language: English - Date: 2011-03-31 14:19:26
490Microsoft PowerPoint - Sutton_Mario_Poster FinalDM.pptx [Read-Only]

Microsoft PowerPoint - Sutton_Mario_Poster FinalDM.pptx [Read-Only]

Add to Reading List

Source URL: computing.ornl.gov

Language: English - Date: 2012-08-08 11:37:00