Sponsor Links |
Soft Name |
|
Recycler_Bin_Record_Reconstruction.pdf |
|
Forensic Analysis of Microsoft Windows Recycle
This paper will discuss the internal data struct... Soft Directory:Security |
|
Chapter2.pdf |
|
An Implementation of Cryptoviral Extortion Using Microsoft¡¯s Crypto API - book excerpt
This ch... Soft Directory:Security |
|
WEIS2006-mcollins-model-opportunistic-07132006.pdf |
|
A Model for Opportunistic Network Exploits: The Case of P2P Worms
We segregate attacks into two... Soft Directory:Security |
|
kddexp.pdf |
|
Tools for Privacy Preserving Distributed Data Mining
This paper presents some early steps towar... Soft Directory:Security |
|
Google Hacking 101 |
|
Resourceful slides and practical examples. Soft Directory:Security |
|
chapter6.pdf |
|
Offshoring decisions are largely business decisions and are often little influenced by considerat... Soft Directory:Security |
|
YCS-2005-389.pdf |
|
This review provides an overview of the current state of the field of anonymity research with par... Soft Directory:Security |
|
Core02.pdf |
|
Dissecting Distributed Malware Networks Soft Directory:Security |
|
047.pdf |
|
Cryptanalysis of an Anonymous Wireless Authentication and Conference Key Distribution Scheme
n ... Soft Directory:Security |
|
brachman.pdf |
|
High-Tech Terror : Al-Qaedas Use of New Technology
Despite the considerable resources that the ... Soft Directory:Security |
|