[Coursera] Malicious Software and its Underground Economy/2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4 |
102.6 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 5 - (a glimpse at) Botnets (26_09).mp4 |
75.6 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 4 - Malicious Software (20_09).mp4 |
58.3 MB |
[Coursera] Malicious Software and its Underground Economy/3 - 5 - IDA Pro—a very simple example. . . (24_17).mp4 |
58.3 MB |
[Coursera] Malicious Software and its Underground Economy/3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp4 |
52.8 MB |
[Coursera] Malicious Software and its Underground Economy/3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp4 |
33.2 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 3 - Admin blabbing (11_38).mp4 |
33.2 MB |
[Coursera] Malicious Software and its Underground Economy/4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp4 |
30.5 MB |
[Coursera] Malicious Software and its Underground Economy/3 - 1 - Early days, AV industry (15_36).mp4 |
29.7 MB |
[Coursera] Malicious Software and its Underground Economy/6 - 2 - Pay-per-install (23.55) .mp4 |
25.1 MB |
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China_'s online underground economy (23_32).mp4 |
25 MB |
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China's online underground economy (23_32).mp4 |
25 MB |
[Coursera] Malicious Software and its Underground Economy/4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp4 |
23.5 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp4 |
19 MB |
[Coursera] Malicious Software and its Underground Economy/4 - 1 - Toward dynamic analysis (15_05).mp4 |
17.6 MB |
[Coursera] Malicious Software and its Underground Economy/5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp4 |
16.9 MB |
[Coursera] Malicious Software and its Underground Economy/6 - 1 - Introduction (15_58).mp4 |
16.8 MB |
[Coursera] Malicious Software and its Underground Economy/3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp4 |
16 MB |
[Coursera] Malicious Software and its Underground Economy/6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp4 |
16 MB |
[Coursera] Malicious Software and its Underground Economy/6 - 4 - Exploit-as-a-Service (15_03).mp4 |
15.9 MB |
[Coursera] Malicious Software and its Underground Economy/4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp4 |
14.1 MB |
[Coursera] Malicious Software and its Underground Economy/7 - 2 - Measuring the cost of cybercrime (12_31).mp4 |
13.9 MB |
[Coursera] Malicious Software and its Underground Economy/4 - 5 - AccessMiner — system-centric models (10_38).mp4 |
13.5 MB |
[Coursera] Malicious Software and its Underground Economy/5 - 2 - Background (12_27).mp4 |
13.4 MB |
[Coursera] Malicious Software and its Underground Economy/5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp4 |
12.6 MB |
[Coursera] Malicious Software and its Underground Economy/5 - 1 - Introduction (10_24).mp4 |
11.3 MB |
[Coursera] Malicious Software and its Underground Economy/7 - 3 - Concluding remarks (8_17).mp4 |
9.3 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 1 - Course Teaser — Introduction (01_11).mp4 |
3.1 MB |
[Coursera] Malicious Software and its Underground Economy/2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).srt |
54 KB |
[Coursera] Malicious Software and its Underground Economy/3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).srt |
39 KB |
[Coursera] Malicious Software and its Underground Economy/4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).srt |
33 KB |
[Coursera] Malicious Software and its Underground Economy/2 - 5 - (a glimpse at) Botnets (26_09).srt |
32 KB |
[Coursera] Malicious Software and its Underground Economy/6 - 2 - Pay-per-install (23.55) .srt |
31 KB |
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China's online underground economy (23_32).srt |
31 KB |
[Coursera] Malicious Software and its Underground Economy/3 - 5 - IDA Pro—a very simple example. . . (24_17).srt |
30 KB |
[Coursera] Malicious Software and its Underground Economy/2 - 4 - Malicious Software (20_09).srt |
26 KB |
[Coursera] Malicious Software and its Underground Economy/4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).srt |
24 KB |
[Coursera] Malicious Software and its Underground Economy/3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).srt |
21 KB |
[Coursera] Malicious Software and its Underground Economy/6 - 1 - Introduction (15_58).srt |
21 KB |
[Coursera] Malicious Software and its Underground Economy/6 - 5 - Memory errors_ the past, the present, and the future (15_30).srt |
21 KB |
[Coursera] Malicious Software and its Underground Economy/5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).srt |
20 KB |
[Coursera] Malicious Software and its Underground Economy/4 - 1 - Toward dynamic analysis (15_05).srt |
20 KB |
[Coursera] Malicious Software and its Underground Economy/3 - 1 - Early days, AV industry (15_36).srt |
19 KB |
[Coursera] Malicious Software and its Underground Economy/6 - 4 - Exploit-as-a-Service (15_03).srt |
19 KB |
[Coursera] Malicious Software and its Underground Economy/7 - 2 - Measuring the cost of cybercrime (12_31).srt |
16 KB |
[Coursera] Malicious Software and its Underground Economy/5 - 2 - Background (12_27).srt |
16 KB |
[Coursera] Malicious Software and its Underground Economy/2 - 3 - Admin blabbing (11_38).srt |
14 KB |
[Coursera] Malicious Software and its Underground Economy/4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).srt |
14 KB |
[Coursera] Malicious Software and its Underground Economy/5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).srt |
14 KB |
[Coursera] Malicious Software and its Underground Economy/4 - 5 - AccessMiner — system-centric models (10_38).srt |
13 KB |
[Coursera] Malicious Software and its Underground Economy/5 - 1 - Introduction (10_24).srt |
13 KB |
[Coursera] Malicious Software and its Underground Economy/7 - 3 - Concluding remarks (8_17).srt |
12 KB |
[Coursera] Malicious Software and its Underground Economy/3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).srt |
11 KB |
[Coursera] Malicious Software and its Underground Economy/_README.txt |
3 KB |
[Coursera] Malicious Software and its Underground Economy/2 - 1 - Course Teaser — Introduction (01_11).srt |
1 KB |