(2013) similarity metric method of obfuscated malware using function call graph
Windows Malware Fingerprinting_McVey-1
Software Development Security. 2 Understand software-based security controls Understand the software development and change/maintenance processes Specialized.
Cellphone and Mobile Device Forensics An update on concepts
Cellphone and Mobile Device Forensics An update on concepts Presented by Peter L. Fryer ACE, CFE, CISA, MPSC.