Trojan horse

Results: 221



#Item
41INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab  Security Simplified

INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2014-11-14 00:47:33
42Eras Edition 9, November 2007 – http://www.arts.monash.edu.au/eras  Martin M. Winkler (ed.), Troy: From Homer’s Iliad to Hollywood Epic, Blackwell Publishing, OxfordISBN

Eras Edition 9, November 2007 – http://www.arts.monash.edu.au/eras Martin M. Winkler (ed.), Troy: From Homer’s Iliad to Hollywood Epic, Blackwell Publishing, OxfordISBN

Add to Reading List

Source URL: arts.monash.edu.au

Language: English - Date: 2008-01-22 19:17:01
43REPORT  HOT KNIVES THROUGH BUTTER: Evading File-based Sandboxes Authors: Abhishek Singh

REPORT HOT KNIVES THROUGH BUTTER: Evading File-based Sandboxes Authors: Abhishek Singh

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 14:56:15
44CyberSecurity http://dcs.ics.forth.gr CyberSecurity Research in Crete  Evangelos Markatos

CyberSecurity http://dcs.ics.forth.gr CyberSecurity Research in Crete Evangelos Markatos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-12-13 04:32:43
45Suspicious or Unusual Event Report

Suspicious or Unusual Event Report

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:52:46
46Cybersoft.com  CyberSoft White Papers VFIND, CIT: TAKE ON THE BARBARIANS ON THE OTHER SIDE OF THE WALL By Roger Harmston

Cybersoft.com CyberSoft White Papers VFIND, CIT: TAKE ON THE BARBARIANS ON THE OTHER SIDE OF THE WALL By Roger Harmston

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
47Tycho Walaardt  Het Paard van Troje Het verlenen van asiel door Nederland in de periodeThe Trojan Horse. Outsider and insider influence on obtaining asylum in the Netherlands in the first decade after the Seco

Tycho Walaardt Het Paard van Troje Het verlenen van asiel door Nederland in de periodeThe Trojan Horse. Outsider and insider influence on obtaining asylum in the Netherlands in the first decade after the Seco

Add to Reading List

Source URL: www.tseg.nl

Language: Dutch - Date: 2010-09-22 10:41:48
    48Authentication and Access Control in Distributed Systems

    Authentication and Access Control in Distributed Systems

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2008-05-02 14:42:00
    49Malware Research and Response at Microsoft Introducing the Microsoft Malware Protection Center June 2011  Malware Research and Response at Microsoft

    Malware Research and Response at Microsoft Introducing the Microsoft Malware Protection Center June 2011 Malware Research and Response at Microsoft

    Add to Reading List

    Source URL: download.microsoft.com

    Language: English - Date: 2011-06-08 20:10:02
    50Justifying Security Spending

    Justifying Security Spending

    Add to Reading List

    Source URL: www.e-cop.net

    Language: English - Date: 2011-04-26 10:49:08