Narrow your search

Library

KU Leuven (7)

LUCA School of Arts (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

UGent (7)

Vlerick Business School (7)

VIVES (7)

VUB (6)

More...

Resource type

book (7)


Language

English (7)


Year
From To Submit

2012 (1)

2011 (1)

2010 (1)

2008 (1)

2007 (1)

More...
Listing 1 - 7 of 7
Sort by

Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica, Calif. : Rand Corp.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

AVIEN malware defense guide for the Enterprise
Author:
ISBN: 1281762903 9786611762902 0080558666 1597491640 9781597491648 9780080558660 9781281762900 6611762906 Year: 2007 Publisher: Burlington, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most abou

Configuring Exchange 2000 Server
Authors: --- ---
ISBN: 1281052841 9786611052843 0080476759 1928994253 Year: 2001 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email

Configuring Symantec Antivirus, corporate edition
Authors: ---
ISBN: 1281056111 9786611056117 0080476716 1931836817 9781931836814 1932266771 9781932266771 9781281056115 6611056114 9780080476711 Year: 2003 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of ""Centralized Antivirus Management."" For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enter


Book
Malware forensics : investigating and analyzing malicious code
Authors: --- ---
ISBN: 1281762954 9786611762957 0080560199 159749268X 9780080560199 9781597492683 9781281762955 6611762957 Year: 2008 Publisher: Burlington, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised


Book
Seven deadliest Microsoft attacks
Authors: ---
ISBN: 1282541749 9786612541742 1597495522 1597495514 9781597495523 9781282541740 9781597495516 Year: 2010 Publisher: Amsterdam ; Boston : Syngress/Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat


Book
Malware Forensics Field Guide for Windows Systems
Authors: --- ---
ISBN: 1280582588 1597494712 9786613612366 1597494739 1597494704 1597494720 9781597494724 9781597494731 9781597494717 9781597494700 9781597494700 Year: 2012 Publisher: Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides , a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists. A condensed hand-held guide complete with on-the-job tasks and checklists Specific for Windows-based systems, the largest running OS in the world Authors are world-renowned leaders in investigating and analyzing malicious code

Keywords

Malware (Computer software) --- Computer viruses. --- Computer security. --- Computer crimes --- Investigation. --- Microsoft Windows (Computer file) --- Computer viruses --- Computer security --- Forensic sciences --- Linux --- Information Technology --- General and Others --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software viruses --- Viruses, Computer --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Protection --- Security measures --- Slackware Linux --- SUSE Linux --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10 --- Investigation

Listing 1 - 7 of 7
Sort by