Software  >   Malware  >  

Kernel Rootkits

RSS Feed    Add to Google    Add to My Yahoo!
Kernel Rootkits White Papers (View All Report Types)
 
Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension

McAfee Initiative to Fight Cybercrime
sponsored by Intel Security
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Intel Security

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

How EMC Built and Scaled TheHub to Serve 12,000 Engineers
sponsored by OutSystems
WHITE PAPER: In this case study, you'll learn how developers at EMC combined a low-code platform with their existing DevOps environment. Discover ways the team explored different technologies to build enterprise-class applications using pre-built components.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

OutSystems

An In-depth look at "Satan": Ransomware-as-a-Service Malware on Deep Web
sponsored by Booz Allen Hamilton
WHITE PAPER: Get a first-hand, in-depth look at how the ransomware-as-a-service (RaaS) malware "Satan" is being promoted on the deep web.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Booz Allen Hamilton

Kickstart DevOps: How to Get Everyone on Board for a Successful Transition
sponsored by New Relic
WHITE PAPER: This e-book explores some of the common barriers to DevOps adoption and how to navigate them for a successful implementation. Discover 4 key steps for starting your DevOps transformation and uncover helpful advice about developing your DevOps toolset for configuration management, performance monitoring, open source, and more.
Posted: 25 Jan 2017 | Published: 31 Dec 2014

New Relic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement