Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.
Computer viruses --- Computer networks --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Security measures
Choose an application
Zeitgenössische IT-Sicherheit operiert in einer Überbietungslogik zwischen Sicherheitsvorkehrungen und Angriffsszenarien. Diese paranoid strukturierte Form negativer Sicherheit lässt sich vom Ursprung der IT-Sicherheit in der modernen Kryptografie über Computerviren und -würmer, Ransomware und Backdoors bis hin zum AIDS-Diskurs der 1980er Jahre nachzeichnen. Doch Sicherheit in und mit digital vernetzten Medien lässt sich auch anders denken: Marie-Luise Shnayien schlägt die Verwendung eines reparativen, queeren Sicherheitsbegriffs vor, dessen Praktiken zwar nicht auf der Ebene des Technischen angesiedelt sind, aber dennoch nicht ohne ein genaues Wissen desselben auskommen.
Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software)
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skills Understand the risk of the rise of document-based malware Enhance your malware analysis concepts through illustrations, tips and tricks, step-by-step instructions, and practical real-world scenarios In Detail Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara. Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.
Malware (Computer software) --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software
Choose an application
Microorganisms, viruses and computer programmes encode all the information they need to reproduce and spread themselves. The mechanisms in the living world, in viruses and even in the world of technical systems are amazingly similar. The book shows how great the parallels of these replication systems are and what they are based on. The excursus also leads into the fascinating world of genetics, to the question of what constitutes life, and to software that replicates itself independently. Content: · What is life? · Basic concepts of molecular genetics · Viruses and early genetics · Algorithms and self-replicating computer programs · What is information? · Coding of information in technology and biology · Coevolution of life and technology The author Rafael Ball holds a PHD in biology, is a historian of science and a librarian. He is director of the ETH Library Zurich and lecturer in library science and management. He works on questions of information theory, scholarly communication and the effects of digitisation He is the author of numerous relevant publications, editor of information science journals and speaker at meetings and conferences.
Human biochemistry --- Biotechnology --- Computer science --- Computer. Automation --- medische biochemie --- bio-engineering --- computers --- informatica --- maatschappij --- biotechnologie --- COVID-19 Pandemic, 2020 --- -Computer viruses. --- Microorganisms --- Virus diseases --- Behavior. --- Transmission.
Choose an application
Computer viruses --- Computer security --- Computer security. --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security measures --- Computer crimes --- Malware (Computer software) --- Data protection --- Security systems --- Hacking --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer Science
Choose an application
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most abou
Computer networks --- Computer security --- Computer viruses. --- Security measures. --- Management. --- Software viruses --- Viruses, Computer --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer crimes --- Malware (Computer software) --- Information Technology --- General and Others
Choose an application
E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email
Client/server computing. --- Microsoft Exchange server. --- Computing, Client/server --- Microsoft Exchange 2000 --- Electronic data processing --- Distributed processing --- Computer viruses. --- Electronic mail systems --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Security measures.
Choose an application
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.
Computer security. --- Computer networks --- Computer viruses. --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Protection --- Security measures --- Computer viruses --- Computer networks - Security measures
Choose an application
This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of ""Centralized Antivirus Management."" For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enter
Computer viruses. --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Software viruses --- Viruses, Computer --- Security measures --- Protection of computer systems --- Protection --- Computer security --- Data protection --- Security systems --- Hacking --- Computer crimes --- Malware (Computer software)
Listing 1 - 10 of 27 | << page >> |
Sort by
|