本站已收录 番号和无损神作磁力链接/BT种子 

[Coursera] Malicious Software and its Underground Economy

种子简介

种子名称: [Coursera] Malicious Software and its Underground Economy
文件类型:
文件数目: 28个文件
文件大小: 782.6 MB
收录时间: 2014-8-19 07:30
已经下载: 3
资源热度: 215
最近下载: 2024-4-29 20:59

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:DE79A02A4317FF7695F8ECC571E385635907E2F5&dn=[Coursera] Malicious Software and its Underground Economy 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[Coursera] Malicious Software and its Underground Economy.torrent
  • 2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4102.65MB
  • 2 - 5 - (a glimpse at) Botnets (26_09).mp475.55MB
  • 2 - 4 - Malicious Software (20_09).mp458.28MB
  • 3 - 5 - IDA Pro—a very simple example. . . (24_17).mp458.27MB
  • 3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp452.84MB
  • 3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp433.17MB
  • 2 - 3 - Admin blabbing (11_38).mp433.17MB
  • 4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp430.46MB
  • 3 - 1 - Early days, AV industry (15_36).mp429.65MB
  • 6 - 2 - Pay-per-install (23.55) .mp425.08MB
  • 7 - 1 - Investigating China_'s online underground economy (23_32).mp425.03MB
  • 7 - 1 - Investigating China's online underground economy (23_32).mp425.03MB
  • 4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp423.48MB
  • 2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp419.02MB
  • 4 - 1 - Toward dynamic analysis (15_05).mp417.63MB
  • 5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp416.89MB
  • 6 - 1 - Introduction (15_58).mp416.84MB
  • 3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp416.03MB
  • 6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp415.97MB
  • 6 - 4 - Exploit-as-a-Service (15_03).mp415.93MB
  • 4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp414.08MB
  • 7 - 2 - Measuring the cost of cybercrime (12_31).mp413.89MB
  • 4 - 5 - AccessMiner — system-centric models (10_38).mp413.52MB
  • 5 - 2 - Background (12_27).mp413.41MB
  • 5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp412.59MB
  • 5 - 1 - Introduction (10_24).mp411.29MB
  • 7 - 3 - Concluding remarks (8_17).mp49.26MB
  • 2 - 1 - Course Teaser — Introduction (01_11).mp43.06MB