Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Arquitectura 3
- Educacion Investigacion 3
- Educación 3
- Education 3
- Malware (Computer software) 3
- Bíblia 2
- Computer networks 2
- Computer security 2
- Crítica, interpretació, etc 2
- Derecho Tributario 2
- Economía 2
- Enseñanza 2
- Història 2
- Information technology 2
- Innovaciones 2
- Management 2
- Obres anteriors al 1800 2
- Poesía galaicoportuguesa 2
- Publicaciones periódicas 2
- Python (Computer program language) 2
- Security measures 2
- Vasconcelos, Carolina Michaëlis de 2
- Accenture (Firm) 1
- Access control 1
- Architecture 1
- Arquitectura sostenible 1
- Art 1
- Artes graficas 1
- Aspectes ambientals 1
- Biblia 1
-
41por Ligh, Michael W.Tabla de Contenidos: “…Recipe 2-9: Graphing Dionaea Attack Patterns with SQLite and GnuplotChapter 3: Malware Classification; Recipe 3-1: Examining Existing ClamAV Signatures; Recipe 3-2: Creating a Custom ClamAV Database; Recipe 3-3: Converting ClamAV Signatures to YARA; Recipe 3-4: Identifying Packers with YARA and PEiD; Recipe 3-5: Detecting Malware Capabilities with YARA; Recipe 3-6: File Type Identification and Hashing in Python; Recipe 3-7: Writing a Multiple-AV Scanner in Python; Recipe 3-8: Detecting Malicious PE Files in Python; Recipe 3-9: Finding Similar Malware with ssdeep…”
Publicado 2011
Libro electrónico -
42Publicado 2009Tabla de Contenidos: “…. -- Reforma gerencialista e mudança na gestão do sistema nacional de vigilância sanitária / Isabela Cardoso de Matos Pinto -- O processo administrativo na âmbito da vigilância sanitária / Yara Oyram Ramos Lima e Ediná Alves Costa -- Avaliação da qualidade de programas e ações de vigilância sanitária / Ligia Maria Vieira da Silva…”
Libro electrónico -
43
-
44por Saavedra Fajardo, Diego de ( 1584-1648)
Publicado 1788Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Central de Capuchinos de España)<img src="http://www.europeana.eu/portal/record/9200127/CE1B0501215CB51AFE053729589A8DDB7F9E6EEF.html"style="border:1px solid#000;width:64px">
Libro -
45por Skolos, NancyTabla de Contenidos: “…Inspiration; 2.1 Found Objects (Melle Hammer, Amsterdam/Yara Khoury, Beirut); 2.2 Materials (Graphic Thought Facility, London); 2.3 Collage (Skolos Wedell, Boston); 2.4 Synaesthesia (James Goggin, Chicago); 3. …”
Publicado 2012
Libro electrónico -
46por Uffelen, Chris vanTabla de Contenidos: “…Conté: Eyelid House South Yara / Fiona Winzar Architects. Libeskind Villa / Studio Daniel Libeskind. …”
Publicado 2012
Libro -
47
-
48por Bacardi Moreau, Emilio“…The story takes place during the revolutionary period of 1868-1878, showing the misfortunes of Cuban society after the cry of Yara to the Pact of the Trench. Emilio Bacardi breathed the historical background outlined in his work and is therefore a direct witness to what was experienced at that stage of the struggle for independence in the city of Santiago. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
49por Bacardi Moreau, Emilio“…The story takes place during the revolutionary period of 1868-1878, showing the misfortunes of Cuban society after the cry of Yara to the Pact of the Trench. Emilio Bacardi breathed the historical background outlined in his work and is therefore a direct witness to what was experienced at that stage of the struggle for independence in the city of Santiago. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
50Publicado 2022Tabla de Contenidos: “…Problematizar el ambiente construido desde la teoría de Paulo Freire / Luz Marie Rodríguez López y Yara Maite Colón Rodríguez -- ¿Misteriosas? ¿Para quién? …”
Libro -
51Publicado 2018Tabla de Contenidos: “…Comparing And Classifying The Malware -- 7.1 Classifying Malware Using Fuzzy Hashing -- 7.2 Classifying Malware Using Import Hash -- 7.3 Classifying Malware Using Section Hash -- 7.4 Classifying Malware Using YARA -- 7.4.1 Installing YARA -- 7.4.2 YARA Rule Basics -- 7.4.3 Running YARA -- 7.4.4 Applications of YARA -- Summary -- Chapter 3: Dynamic Analysis -- 1. …”
Libro electrónico -
52por Oktavianto, Digit“…Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. …”
Publicado 2013
Libro electrónico -
53Publicado 2014“…., Shell, Siemens, Swiss Re, Unilever, and Yara designed to explore possible corporate contributions to global resilience, especially at the nexus of water, food and energy. …”
Libro electrónico -
54
-
55Publicado 2015Tabla de Contenidos: “…Manual Examination with libimobiledeviceSummary; Chapter 7: Using Python for Memory Forensics; Understanding Volatility basics; Using Volatility on Android; LiME and the recovery image; Volatility for Android; Reconstructing data for Android; Call history; Keyboard cache; Using Volatility on Linux; Memory acquisition; Volatility for Linux; Reconstructing data for Linux; Analyzing processes and modules; Analyzing networking information; Malware hunting with the help of YARA; Summary; Where to go from here; Index…”
Libro electrónico -
56Publicado 2024Tabla de Contenidos: “…Instant Confessions <i>Yara Gawrieh Ekmark (independent scholar)</i> <i> </i>Chapter 6. …”
Libro electrónico -
57Publicado 2022Tabla de Contenidos: “…Further reading -- Chapter 15: Ransomware Investigations -- Ransomware initial access and execution -- Initial access -- Execution -- Discovering credential access and theft -- ProcDump -- Mimikatz -- Investigating post-exploitation frameworks -- Command and Control -- Security Onion -- RITA -- Arkime -- Investigating lateral movement techniques -- Summary -- Questions -- Further reading -- Part 5: Threat Intelligence and Hunting -- Chapter 16: Malware Analysis for Incident Response -- Malware analysis overview -- Malware classification -- Setting up a malware sandbox -- Local sandbox -- Cloud sandbox -- Static analysis -- Static properties analysis -- Dynamic analysis -- Process Explorer -- Process Spawn Control -- Automated analysis -- ClamAV -- YARA -- YarGen -- Summary -- Questions -- Further reading -- Chapter 17: Leveraging Threat Intelligence -- Threat intelligence overview -- Threat intelligence types -- The Pyramid of Pain -- The threat intelligence methodology -- Sourcing threat intelligence -- Internally developed sources -- Commercial sourcing -- Open source intelligence -- The MITRE ATT& -- CK framework -- Working with IOCs and IOAs -- Threat intelligence and incident response -- Autopsy -- Maltego -- YARA and Loki -- Summary -- Questions -- Further reading -- Chapter 18: Threat Hunting -- Threat hunting overview -- Threat hunt cycle -- Threat hunt reporting -- Threat hunting maturity model -- Crafting a hypothesis -- MITRE ATT& -- CK -- Planning a hunt -- Digital forensic techniques for threat hunting -- EDR for threat hunting -- Summary -- Questions -- Further reading -- Appendix -- Assessments -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
58Publicado 2015Tabla de Contenidos: “…Conclusion -- References -- Chapter 5 - Internal intelligence sources -- Information in This Chapter: -- Introduction -- Asset, vulnerability, and configuration management -- Configuration management -- Network logging -- The trouble with SIEMs -- The power of SIEMs -- Managed security service providers -- Access control -- Network monitoring -- Conclusion -- References -- Chapter 6 - External intelligence sources -- Information in This Chapter: -- Introduction -- Brand monitoring versus intelligence -- Asset, vulnerability, and configuration management -- Network logging -- IP addresses as pivot points -- Domain names as pivot points -- File hashes as pivot points -- Pivoting from MSSP alerts -- Network monitoring -- YARA -- Protecting against zero-day attacks -- Incident response and intelligence -- Collaborative research into threats -- Conclusion -- ReferenceS -- Chapter 7 - Fusing internal and external intelligence -- Information in This Chapter: -- Introduction -- Security awareness training -- Customer security awareness training -- OpenIOC, CyBOX, STIX, and TAXII -- OpenIOC -- CyBOX -- STIX and TAXII -- Threat intelligence management platforms -- TIMPs as a Rosetta Stone -- Big data security analytics -- Hadoop -- Conclusion -- Reference -- Chapter 8 - CERTs, ISACs, and intelligence-sharing communities -- Information in This Chapter: -- Introduction -- CERTs and CSIRTs -- CERT/Coordination Center -- US-CERT and country-level CSIRTs -- Company-level CSIRTs -- ISACs -- The ISACs -- Intelligence-sharing communities -- Conclusion -- References -- Chapter 9 - Advanced intelligence capabilities -- Information in This Chapter: -- Introduction -- Malware analysis -- Why it is a bad idea -- Setting up a malware lab -- Planning the network -- Virtual machines versus cloning -- Getting the malware to the lab -- Malware tools -- System tools -- Sandbox…”
Libro electrónico -
59Publicado 2017Tabla de Contenidos: “…. -- Scanning for indicators with YARA -- Getting started -- How to do it... -- How it works... -- Chapter 8: Working with Forensic Evidence Container Recipes -- Introduction -- Opening acquisitions -- Getting started -- How to do it... -- How it works... -- Gathering acquisition and media information -- Getting started -- How to do it... -- How it works... -- Iterating through files -- Getting started -- How to do it... -- How it works... -- There's more... -- Processing files within the container -- Getting started -- How to do it... -- How it works... -- Searching for hashes -- Getting started -- How to do it... -- How it works... -- There's more... -- Chapter 9: Exploring Windows Forensic Artifacts Recipes - Part I -- Introduction -- One man's trash is a forensic examiner's treasure -- Getting started -- How to do it... -- How it works... -- A sticky situation -- Getting started -- How to do it... -- How it works... -- Reading the registry -- Getting started -- How to do it…”
Libro electrónico -
60Publicado 2018Tabla de Contenidos: “…Chapter 12: Security Testing Toolkits -- General security testing toolkits -- Automation testing criteria -- Behavior-driven security testing framework -- Android security testing -- Securing infrastructure configuration -- Docker security scanning -- Integrated security tools -- Summary -- Questions -- Further reading -- Chapter 13: Security Automation with the CI Pipeline -- Security in continuous integration -- Security practices in development -- IDE plugins to automate the code review -- Static code analysis -- Secure compiler configuration -- Dependency check -- Web testing in proactive/proxy mode -- Web automation testing tips -- Security automation in Jenkins -- Summary -- Questions -- Further reading -- Chapter 14: Incident Response -- Security incident response process -- Preparation -- Detection and analysis -- Containment and recovery -- Post-incident activity -- Security incident response platforms (SIRP) -- SOC team -- Incident forensics techniques -- Summary -- Questions -- Further reading -- Chapter 15: Security Monitoring -- Logging policy -- Security monitoring framework -- Source of information -- Threat intelligence toolset -- Security scanning toolset -- Malware behavior matching - YARA -- Summary -- Questions -- Further reading -- Chapter 16: Security Assessment for New Releases -- Security review policies for releases -- Security checklist and tools -- BDD security framework -- Consolidated testing results -- Summary -- Questions -- Further reading -- Chapter 17: Threat Inspection and Intelligence -- Unknown threat detection -- Indicators of compromises -- Security analysis using big data frameworks -- TheHive -- MISP - an Open Source Threat Intelligence Platform -- Apache Metron -- Summary -- Questions -- Further reading -- Chapter 18: Business Fraud and Service Abuses -- Business fraud and abuses…”
Libro electrónico