Directory: Hacking-and-IT-E-Book-Dump-Part-2-2010Kaiser-amp-amp-UA-07
Hacking, Book, Dump, Part, Kaiser
Files:
Computers and epidemiology.pdf 142.25 KB
Computers under attacks!.pdf 84.94 KB
Concepts and Future Trends in Computer Virology.pdf 840.67 KB
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf 224.84 KB
Concepts of cooperation in artificial life.pdf 352.81 KB
Conceptual Frameworks for Artificial Immune Systems.pdf 283.96 KB
Conflict and the Computer Information Warfare and Related Ethical Issues.pdf 247.92 KB
Consensual Realities in Cyberspace.pdf 241.64 KB
Console viruses.pdf 119.07 KB
Constructing Computer Virus Phylogenies.pdf 189.71 KB
Constructing Malware Normalizers using Term Rewriting.pdf 219.17 KB
Contagion and Repetition On the Viral Logic of Network Culture.pdf 173.16 KB
Contagion on the Internet.pdf 118.14 KB
Contournement dune passerelle antivirus.pdf 122.19 KB
Control Flow Graphs as Malware Signatures.pdf 158.41 KB
Control Flow to Detect Malware.pdf 344.78 KB
Controlling Super-Intelligent Machines.pdf 17.51 KB
Convergence of Virus Writers and Hackers Fact or Fantasy.pdf 255.33 KB
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf 142.78 KB
Corporate Virus Protection.pdf 20.24 KB
Countering Kernel Rootkits with Lightweight Hook Protection.pdf 188.34 KB
Countering Network Worms Through Automatic Patch Generation.pdf 281.28 KB
Countering NetworkWorms Through Automatic Patch Generation.pdf 149.77 KB
Covert Distributed Processing with Computer Viruses.pdf 179.49 KB
Creating a Secure Computer Virus Laboratory.pdf 54.02 KB
Crimea river.pdf 44.29 KB
Crisis and Aftermath.pdf 1.13 MB
Criss-cross.pdf 43.55 KB
Cryptographic Hashing for Virus Localization.pdf 153.67 KB
Cryptography all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf 4.72 MB
Cryptography and Viruses.pdf 95.97 KB
Cryptovirology Extortion-Based Security Threats and Countermeasures.pdf 1.14 MB
Danger theory and collaborative filtering in MANETs.pdf 372.18 KB
Danger! Deadly new computer viruses want to kill your PC.pdf 130.63 KB
Darwin inside the machines Malware evolution and the consequences for computer security.pdf 1.38 MB
Darwin, a Game of Survival of the Fittest among Programs.pdf 25.88 KB
Darwin.pdf 216.16 KB
Data Mining Methods for Detection of New Malicious Executables.pdf 157.87 KB
Data security from malicious attack Computer Virus.pdf 105.96 KB
Database Rootkits.pdf 721.04 KB
DCA for Bot Detection.pdf 172.76 KB
Deelaed learning.pdf 46.88 KB
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf 357.33 KB
Defeating Polymorphism Beyond Emulation.pdf 459.17 KB
Defeating Polymorphism White Paper.pdf 459.17 KB
Defending against Hitlist Worms using Network Address Space Randomization.pdf 162.81 KB
Defending Against Internet Worms A Signature-Based Approach.pdf 156.39 KB
Defending against Viruses and Worms.pdf 1.19 MB
Defense Against the Dark Arts.pdf 100.54 KB
Defense and Detection Strategies against Internet Worms.pdf 2.89 MB
Defense-In-Depth Against Computer Viruses.pdf 141.17 KB
Des IDS et des vers... D%2b%aetection par l%27analyse statistique %253A de la th%2b%aeorie %2b%e1 la pratique %253F.pdf 294.56 KB
Design of a neural network for recognition and classification of computer viruses.pdf 1.22 MB
Design of a System for Real-Time Worm Detection.pdf 242.58 KB
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf 68.64 KB
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf 1.54 MB
Detecting Early Worm Propagation through Packet Matching.pdf 164.13 KB
Detecting Internet Worms Using Data Mining Techniques.pdf 135.53 KB
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf 788.28 KB
Detecting Malicious Code by Model Checking.pdf 699.54 KB
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf 832.71 KB
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf 248.01 KB
Detecting Metamorphic Computer Viruses using Supercompilation.pdf 211.11 KB
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf 573.86 KB
Detecting metamorphic viruses using profile hidden markov models.pdf 547.6 KB
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf 317.94 KB
Detecting self-mutating malware using control-flow graph matching.pdf 98.49 KB
Detecting Sources of Computer Viruses in Networks Theory and Experiment.pdf 1.07 MB
Detecting Stealth Software with Strider GhostBuster.pdf 323.51 KB
Detecting Unknown Computer Viruses.pdf 1.32 MB
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf 250.53 KB
Detecting Viral Propagations Using Email Behavior Profiles.pdf 1.3 MB
Detecting Virus Mutations Via Dynamic Matching.pdf 297.62 KB
Detecting Windows Server Compromises with Patchfinder 2.pdf 186.94 KB
Detecting Worms through Cryptographic Hashes.pdf 308.37 KB
Detecting worms through de-centralized monitoring.pdf 202.75 KB
Detecting Worms via Mining Dynamic Program Execution.pdf 231.1 KB
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf 229.76 KB
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf 2.83 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings.pdf 4.3 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf 14.03 MB
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf 3.78 MB
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf 2.03 MB
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf 221.83 KB
Detection of Metamorphic and Virtualization-based malware using Algebraic Specification_001.pdf 146.97 KB
Detection of metamorphic computer viruses using algebraic specification.pdf 210.96 KB
Detection of New Malicious Code Using N-grams Signatures.pdf 358.54 KB
Detection of Self-Mutating Computer Viruses.pdf 114.46 KB
Developing a Trojan applets in a smart card.pdf 639.71 KB
Development of Computer Vulnerability Scanning Scanning Workgroup.pdf 269.96 KB
Development of inland lakes as hubs in an invasion network.pdf 972.05 KB
Die Gefahr Von Debug Codes.pdf 169.46 KB
Digital Postmark Helps Fight Spam, Virus Attacks.pdf 150.92 KB
Directed-Graph Epidemiological Models of Computer Viruses.pdf 1.59 MB
Disk-Level Behavioral Malware Detection.pdf 1.08 MB
Disk-Level Behavioral Virus Detection.pdf 5.45 MB
Distributed Computing with a Trojan Horse.pdf 590.17 KB
Distributed Worm Simulation with a Realistic Internet Model.pdf 592.89 KB
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf 889.47 KB
Do the macarena.pdf 57.99 KB
Do The Media Spread Computer Viruses.pdf 18.3 KB
Do-It-Yourself Guide to Cell Phone Malware.pdf 188.35 KB
Doin' the eagle rock.pdf 45.16 KB
Dynamic analysis of malicious code.pdf 212.41 KB
Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf 343.2 KB
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf 3.82 MB
Dynamical Models for Computer Viruses Propagation.pdf 3.82 MB
E-mail virus protection handbook.pdf 491.92 KB
ELF et virologie informatique.pdf 256.94 KB
EPOCalypse NOW!.pdf 456 KB
Trackers:
udp://tracker.openbittorrent.com:80/scrape: 5 seeds
udp://tracker.publicbt.com:80/scrape: 7 seeds
http://tracker.thepiratebay.org/scrape: 0 seeds