Sponsor Links   | 
        
         
          | Soft Name | 
           | 
        
         
            
            Recycler_Bin_Record_Reconstruction.pdf  | 
           | 
        
 Forensic Analysis of Microsoft Windows Recycle  
This paper will discuss the internal data struct... Soft Directory:Security   | 
  | 
        
         
            
            Chapter2.pdf  | 
           | 
        
 An Implementation of Cryptoviral Extortion Using Microsoft¡¯s Crypto API - book excerpt  
This ch... Soft Directory:Security   | 
  | 
        
         
            
            WEIS2006-mcollins-model-opportunistic-07132006.pdf  | 
           | 
        
 A Model for Opportunistic Network Exploits: The Case of P2P Worms  
We segregate attacks into two... Soft Directory:Security   | 
  | 
        
         
            
            kddexp.pdf  | 
           | 
        
 Tools for Privacy Preserving Distributed Data Mining  
This paper presents some early steps towar... Soft Directory:Security   | 
  | 
        
         
            
            Google Hacking 101  | 
           | 
        
 Resourceful slides and practical examples. Soft Directory:Security   | 
  | 
        
         
            
            chapter6.pdf  | 
           | 
        
 Offshoring decisions are largely business decisions and are often little influenced by considerat... Soft Directory:Security   | 
  | 
        
         
            
            YCS-2005-389.pdf  | 
           | 
        
 This review provides an overview of the current state of the field of anonymity research with par... Soft Directory:Security   | 
  | 
        
         
            
            Core02.pdf  | 
           | 
        
 Dissecting Distributed Malware Networks Soft Directory:Security   | 
  | 
        
         
            
            047.pdf  | 
           | 
        
 Cryptanalysis of an Anonymous Wireless Authentication and Conference Key Distribution Scheme  
n ... Soft Directory:Security   | 
  | 
        
         
            
            brachman.pdf  | 
           | 
        
 High-Tech Terror : Al-Qaedas Use of New Technology  
Despite the considerable resources that the ... Soft Directory:Security   | 
  |