Narrow your search

Library

Odisee (27)

Thomas More Kempen (27)

Thomas More Mechelen (27)

UCLL (27)

VIVES (27)

KU Leuven (19)

LUCA School of Arts (17)

VUB (16)

ULB (13)

ULiège (13)

More...

Resource type

book (26)

digital (1)

periodical (1)


Language

English (26)

German (1)


Year
From To Submit

2023 (1)

2022 (1)

2021 (1)

2020 (1)

2017 (1)

More...
Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
Zero days, thousands of nights : the life and times of zero-day vulnerabilities and their exploits
Authors: ---
ISBN: 0833097784 9780833097781 9780833097613 083309761X Year: 2017 Publisher: Santa Monica, California : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.


Book
Unsicheren Kanäle : Negative und queere Sicherheit in Kryptologie und Informatik
Author:
ISBN: 3732863069 383766306X Year: 2022 Publisher: Bielefeld : transcript Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Zeitgenössische IT-Sicherheit operiert in einer Überbietungslogik zwischen Sicherheitsvorkehrungen und Angriffsszenarien. Diese paranoid strukturierte Form negativer Sicherheit lässt sich vom Ursprung der IT-Sicherheit in der modernen Kryptografie über Computerviren und -würmer, Ransomware und Backdoors bis hin zum AIDS-Diskurs der 1980er Jahre nachzeichnen. Doch Sicherheit in und mit digital vernetzten Medien lässt sich auch anders denken: Marie-Luise Shnayien schlägt die Verwendung eines reparativen, queeren Sicherheitsbegriffs vor, dessen Praktiken zwar nicht auf der Ebene des Technischen angesiedelt sind, aber dennoch nicht ohne ein genaues Wissen desselben auskommen.


Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica, Calif. : Rand Corp.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.


Book
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox
Authors: ---
ISBN: 1782169245 9781782169246 1782169237 9781782169239 9781782169239 Year: 2013 Publisher: Birmingham : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skills Understand the risk of the rise of document-based malware Enhance your malware analysis concepts through illustrations, tips and tricks, step-by-step instructions, and practical real-world scenarios In Detail Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara. Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.


Multi
Viruses in All Dimensions : How an Information Code Controls Viruses, Software and Microorganisms
Author:
ISBN: 9783658388263 9783658388256 9783658388270 Year: 2023 Publisher: Wiesbaden, Germany : Springer Fachmedien Wiesbaden GmbH,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Microorganisms, viruses and computer programmes encode all the information they need to reproduce and spread themselves. The mechanisms in the living world, in viruses and even in the world of technical systems are amazingly similar. The book shows how great the parallels of these replication systems are and what they are based on. The excursus also leads into the fascinating world of genetics, to the question of what constitutes life, and to software that replicates itself independently. Content: · What is life? · Basic concepts of molecular genetics · Viruses and early genetics · Algorithms and self-replicating computer programs · What is information? · Coding of information in technology and biology · Coevolution of life and technology The author Rafael Ball holds a PHD in biology, is a historian of science and a librarian. He is director of the ETH Library Zurich and lecturer in library science and management. He works on questions of information theory, scholarly communication and the effects of digitisation He is the author of numerous relevant publications, editor of information science journals and speaker at meetings and conferences.


Periodical
Journal of computer virology and hacking techniques.
ISSN: 22638733 Year: 2013 Publisher: [Paris, France] : Springer,

AVIEN malware defense guide for the Enterprise
Author:
ISBN: 1281762903 9786611762902 0080558666 1597491640 9781597491648 9780080558660 9781281762900 6611762906 Year: 2007 Publisher: Burlington, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most abou

Configuring Exchange 2000 Server
Authors: --- ---
ISBN: 1281052841 9786611052843 0080476759 1928994253 Year: 2001 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email

Defense and detection strategies against internet worms
Author:
ISBN: 1580537731 9781580537735 9781580535373 1580535372 1580533572 9781580533577 1580533574 Year: 2004 Publisher: Boston, Massachusetts : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

Configuring Symantec Antivirus, corporate edition
Authors: ---
ISBN: 1281056111 9786611056117 0080476716 1931836817 9781931836814 1932266771 9781932266771 9781281056115 6611056114 9780080476711 Year: 2003 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of ""Centralized Antivirus Management."" For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enter

Listing 1 - 10 of 27 << page
of 3
>>
Sort by