VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
Firewall
When good code goes bad
Ch19
Malware and the risks of weaponizing code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Information Security: DBPO
PPT slides
Chapter 01
Argus.flocon.2011.Tutorial
Malicious software
Chapter 3 Computer Crimes