From SIEM to SA: The Path Forward
Introduction To Malware Analysis
Leveraging Digital Forensics | Patricia Watson
Exclusive Networks Solutions Guide
Fast Automated Unpacking and Classification of Malware
Reversing and Decrypting the Communications of APT Malware (Etumbot)
The Ida Pro Book
Exploiting Vulnerabilities in Multifunction Printers
Reverse Engineering Malware: A look inside Operation Tovar
RSA Anatomy of an Attack
Increasing Visibility and Security Across your Network: The HP Arcsight and AcessData CIRT Integrated Solution
CrowdCasts Monthly: Going Beyond the Indicator