Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Bojan Zdrnja"'
Autor:
Michael Blanchard, David Harley, Andrew Lee, Bojan Zdrnja, Igor Muttik, Ken Bechtel, Robert S. Vibert, Henk Diemer
Experience suggests that many administrators and managers with excellent technical knowledge in mainstream security (network security, firewall, encryption, and so on) are less familiar with the issues of cyber stalking, and have been subjected to th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::13cb8c066e0065d5c6804b6fcddd594b
https://doi.org/10.1016/b978-159749164-8.50008-7
https://doi.org/10.1016/b978-159749164-8.50008-7
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783540736134
DIMVA
DIMVA
We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect unusual behaviour. Our DNS response data have included typo squatter domains, fast flux domains and domains being (ab)used by sp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1deb0d357b75b46fa2425e0d5203d710
https://doi.org/10.1007/978-3-540-73614-1_8
https://doi.org/10.1007/978-3-540-73614-1_8
Autor:
Andrew Lee, Robert S. Vibert, David Harley, Henk Diemer, Bojan Zdrnja, Igor Muttik, Michael Blanchard, Ken Bechtel
Publisher Summary Nowadays, technical solutions are not enough, because so many of the current pains in assets are far less susceptible to proactive detection. No single group has all the answers, and some problems are better addressed by some of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a9ecbef04ca1a104e2f393823a9d4a7
https://doi.org/10.1016/b978-159749164-8.50007-5
https://doi.org/10.1016/b978-159749164-8.50007-5
Autor:
Ken Bechtel, Michael Blanchard, Robert S. Vibert, Henk Diemer, David Harley, Bojan Zdrnja, Igor Muttik, Andrew Lee
Publisher Summary This chapter is based on the works of Michael Blanchard and Bojan Zdrnja. It deals with malware analysis and forensics techniques and tools, starting from basics and progressing to advanced forensics. In the past couple of years, ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4880eefe57cd6d238d84fc4bf3b780d4
https://doi.org/10.1016/b978-159749164-8.50015-4
https://doi.org/10.1016/b978-159749164-8.50015-4
Autor:
David Harley, Robert S. Vibert, Ken Bechtel, Michael Blanchard, Henk Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja
Publisher Summary Outsourcing is a commonly considered option today for Information Technology (IT) security managers in public, private, and non-profit entities and in most areas of information management. This chapter considers outsourcing anti-mal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b4f6611e37ee828ef2ecdda8d050349
https://doi.org/10.1016/b978-159749164-8.50013-0
https://doi.org/10.1016/b978-159749164-8.50013-0
Autor:
Ken Bechtel, Robert S. Vibert, David Harley, Andrew Lee, Michael Blanchard, Henk Diemer, Bojan Zdrnja, Igor Muttik
Publisher Summary It has long been held in some security circles that education does not work. In fact, this assertion is really based on a fundamental disagreement about what one can expect education to accomplish. Education and training have certai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::36b824bb29757635f39b1a74e3931f3b
https://doi.org/10.1016/b978-159749164-8.50014-2
https://doi.org/10.1016/b978-159749164-8.50014-2
Autor:
Bojan Zdrnja, Henk Diemer, Ken Bechtel, David Harley, Igor Muttik, Robert S. Vibert, Andrew Lee, Michael Blanchard
Publisher Summary This chapter describes the works of Tony Bradley and David Harley who revisit the subject and offer a comprehensive overview of the robot (bot) threat and its implications for the enterprise. Botnets are arguably the biggest threat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c977dfd7d9a712f671c0c5ea7ba11788
https://doi.org/10.1016/b978-159749164-8.50010-5
https://doi.org/10.1016/b978-159749164-8.50010-5
Autor:
Ken Bechtel, Andrew Lee, David Harley, Bojan Zdrnja, Henk Diemer, Michael Blanchard, Robert S. Vibert, Igor Muttik
Publisher Summary The change from antivirus (AV) to anti-malware technology in recent years has been dramatic. But the changes in malware authoring culture have been even more spectacular. At the beginning of the 21st century, the ether was still buz
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af5b10f2b7f5edeb022ce4608c303aa5
https://doi.org/10.1016/b978-159749164-8.50011-7
https://doi.org/10.1016/b978-159749164-8.50011-7
Autor:
David Harley, Robert S. Vibert, Ken Bechtel, Andrew Lee, Henk Diemer, Bojan Zdrnja, Igor Muttik, Michael Blanchard
This chapter covers Defense in Depth (DiD). It deals with Paul Schmehl’s work, in which he takes a broad look at DiD in the enterprise. Following this, it discusses Ken Bechtel’s work, which covers many of the implementation angles. It also consi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb5b05566ab0dcf093c589e71a9cb256
https://doi.org/10.1016/b978-159749164-8.50012-9
https://doi.org/10.1016/b978-159749164-8.50012-9
Autor:
David Harley, Igor Muttik, Bojan Zdrnja, Andrew Lee, Henk Diemer, Robert S. Vibert, Ken Bechtel, Michael Blanchard
This chapter reviews the work of David Harley and Andrew Lee who emphasize the do-it-yourself (D-I-Y) theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. Testing is a particularly hot topic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f50fac3e71616c36fecedce059569c43
https://doi.org/10.1016/b978-159749164-8.50016-6
https://doi.org/10.1016/b978-159749164-8.50016-6