Beruflich Dokumente
Kultur Dokumente
ga(function(tracker) {
var cookie_jar = new CookieJar({ path: '/', expires: (60 * 60 * 24 * 365 *
2)});
cookie_jar.put('ga_clientid', tracker.get('clientId'));
});
</script>
<link rel="canonical" href="https://www.scribd.com/document/290788315/Notes-for-
Presentation-Malware"><script type="text/javascript">
Scribd.logged_in = true;
Scribd.current_user = {"is_facebook_user":false,"is_google_user":false,"id
":358063782,"active_archive_purchase":false,"pmp_subscriber":false,"login":"asus
7hael","has_purchased":false,"content_pool_ids":[10],"display_language_bar":fals
e,"has_email":true,"language_id":1,"country":"FR","country_id":104};
Scribd.browser_uuid = "401ec340-9cf6-0134-8992-0025902de78c";
Scribd.user_data = {
current_user_country: "FR",
current_user_country_id: 104,
}
Scribd.user_data.is_subscriber = false;
Scribd.user_data.is_pmp = false;
</script><script type="text/javascript">Scribd.eligible_for_seo_roadblock
= true;Scribd.current_doc = {"id":290788315,"title":"Notes for Presentation Malw
are","private":false,"page_count":5,"url":"https://www.scribd.com/document/29078
8315/Notes-for-Presentation-Malware","download_url":"https://www.scribd.com/docu
ment_downloads/290788315","secret_password":null,"description":"Malware Presenta
tion for computer crime law","created_at":"11 / 23 / 2015","short_title":"Notes
for Presentation Malware","category_id":null,"converting":false,"paid":false,"re
ads":null,"thumbnail_url":"https://imgv2-2-f.scribdassets.com/img/document/29078
8315/54x70/29feb3d20e/1494924483","word_count":1067,"reading_speed_wpm":281,"boo
kmark":true,"author_id":56189718,"author_name":"Erin Jennings","author_url":"/us
er/56189718/Erin-Jennings","document_type":"document","price":"","reading_progre
ss":{"update_url":"https://www.scribd.com/reading_progress"},"access_key":"key-9
fJn9rkadMUk9OB09yz0","is_searchable":true,"is_owner":false,"is_private":false,"i
s_commentable":true,"is_downloadable":true,"is_deletable":true,"is_paid":false,"
is_archived":true,"is_comic":false,"is_audiobook":false,"is_sheet_music":false,"
show_archive_paywall":true,"view_restricted":false,"downloadable_for_premium_use
rs":true,"preferred_ext":null,"can_purchase":false,"signup_context":"archive","i
s_pmp":false,"language_id":1,"is_credit_restricted":false,"is_view_restricted_ar
chive":false};</script><style media="print">
.document_column, .document_column * {
display: none !important;
}
</style> <script type="text/javascript">
var I18n = I18n || {};
I18n.defaultLocale = "en_US";
I18n.locale = "en_US";
</script>
<script type="text/javascript">
window['$rat'] = ratInit(["https://rs1.scribd.com/","https://rs2.scribd.co
m/","https://rs3.scribd.com/","https://rs4.scribd.com/","https://rs5.scribd.com/
","https://rs6.scribd.com/","https://rs7.scribd.com/","https://rs8.scribd.com/"]
, {"user_id":358063782,"doc_id":290788315}, false);
$rat.root().withVid(function(vid) { $rat("gotvid", { vid: vid}) })
</script><script type="text/javascript">Scribd.tracker = new Scribd.Tracker(
document);</script><link rel="alternate" href="android-app://com.scribd.app.read
er0/http/www.scribd.com/document/290788315/Notes-for-Presentation-Malware?t=Note
s+for+Presentation+Malware"></head><body class="autogen_class_views_layouts_doc
autogen_class_views_layouts_legacy_web autogen_class_views_layouts_web autogen_c
lass_widgets_page autogen_class_widgets_base no_scrolling fixed_min_width" data-
revision="bc0ef9d8c51c6a86aa898f3e6d6f8d6a78c4e189"><div class="autogen_class_vi
ews_chrome_header autogen_class_widgets_base global_header" id="global_header" d
ata-track_category="header"><header class="header_upper "><a href="https://www.s
cribd.com/" title="Scribd" data-track="logo" class="header_logo"><h1 class="scri
bd_blue_long_logo"><span class="visually_hidden">Scribd</span></h1></a><div clas
s="browse_all_container"><a href="#" class="browse_all_btn icon_btn"><span class
="icon icon-ic_globalnav_browse"></span><span class="icon_btn_text">Explore</spa
n><span class="arrow icon-ic_down_arrow"></span></a></div><div class="autogen_cl
ass_views_chrome_browse_all_menu autogen_class_widgets_base browse_all_menu" id=
"autogen_id_553507997"><div class="menu_wrapper"><nav class="menu" arial-label="
Browse by Interests or Content Type"><span class="close_btn icon-ic_close" arial
-label="Close Browse Menu"></span><div class="browse_by_interest_container"><h2
class="browse_by_title by_interest">EXPLORE BY INTERESTS</h2><div class="autogen
_class_views_shared_interests_list autogen_class_widgets_base" id="autogen_id_55
3504671"><article class="all_interests"><div class="interest_block"><h3 class="t
op_level_interest parent_interest"><a href="https://www.scribd.com/explore/Caree
r-Money" class="interest_btn interest_link" data-interest_name="Career & Mon
ey">Career & Money</a></h3><ul class="second_level_interests"><li class="chi
ld_interest"><a href="https://www.scribd.com/explore/Career-Money/Business-Biogr
aphy-History" class="interest_btn interest_link" data-interest_name="Business Bi
ography & History">Business Biography & History</a></li><li class="child
_interest"><a href="https://www.scribd.com/explore/Career-Money/Entrepreneurship
" class="interest_btn interest_link" data-interest_name="Entrepreneurship">Entre
preneurship</a></li><li class="child_interest"><a href="https://www.scribd.com/e
xplore/Career-Money/Leadership-Mentoring" class="interest_btn interest_link" dat
a-interest_name="Leadership & Mentoring">Leadership & Mentoring</a></li>
<li class="child_interest"><a href="https://www.scribd.com/explore/Career-Money/
Money-Management" class="interest_btn interest_link" data-interest_name="Money M
anagement">Money Management</a></li><li class="child_interest"><a href="https://
www.scribd.com/explore/Career-Money/Time-Management" class="interest_btn interes
t_link" data-interest_name="Time Management">Time Management</a></li></ul></div>
<div class="interest_block"><h3 class="top_level_interest parent_interest"><a hr
ef="https://www.scribd.com/explore/Personal-Growth" class="interest_btn interest
_link" data-interest_name="Personal Growth">Personal Growth</a></h3><ul class="s
econd_level_interests"><li class="child_interest"><a href="https://www.scribd.co
m/explore/Personal-Growth/Happiness" class="interest_btn interest_link" data-int
erest_name="Happiness">Happiness</a></li><li class="child_interest"><a href="htt
ps://www.scribd.com/explore/Personal-Growth/Psychology" class="interest_btn inte
rest_link" data-interest_name="Psychology">Psychology</a></li><li class="child_i
nterest"><a href="https://www.scribd.com/explore/Personal-Growth/Relationships-P
arenting" class="interest_btn interest_link" data-interest_name="Relationships &
amp; Parenting">Relationships & Parenting</a></li><li class="child_interest"
><a href="https://www.scribd.com/explore/Personal-Growth/Religion-Spirituality"
class="interest_btn interest_link" data-interest_name="Religion & Spirituali
ty">Religion & Spirituality</a></li><li class="child_interest"><a href="http
s://www.scribd.com/explore/Personal-Growth/Self-Improvement" class="interest_btn
interest_link" data-interest_name="Self-Improvement">Self-Improvement</a></li><
/ul></div><div class="interest_block"><h3 class="top_level_interest parent_inter
est"><a href="https://www.scribd.com/explore/Politics-Current-Affairs" class="in
terest_btn interest_link" data-interest_name="Politics & Current Affairs">Po
litics & Current Affairs</a></h3><ul class="second_level_interests"><li clas
s="child_interest"><a href="https://www.scribd.com/explore/Politics-Current-Affa
irs/Politics" class="interest_btn interest_link" data-interest_name="Politics">P
olitics</a></li><li class="child_interest"><a href="https://www.scribd.com/explo
re/Politics-Current-Affairs/Society" class="interest_btn interest_link" data-int
erest_name="Society">Society</a></li></ul></div><div class="interest_block"><h3
class="top_level_interest parent_interest"><a href="https://www.scribd.com/explo
re/Science-Tech" class="interest_btn interest_link" data-interest_name="Science
& Tech">Science & Tech</a></h3><ul class="second_level_interests"><li cl
ass="child_interest"><a href="https://www.scribd.com/explore/Science-Tech/Scienc
e" class="interest_btn interest_link" data-interest_name="Science">Science</a></
li><li class="child_interest"><a href="https://www.scribd.com/explore/Science-Te
ch/Tech" class="interest_btn interest_link" data-interest_name="Tech">Tech</a></
li></ul></div><div class="interest_block"><h3 class="top_level_interest parent_i
nterest"><a href="https://www.scribd.com/explore/Health-Fitness" class="interest
_btn interest_link" data-interest_name="Health & Fitness">Health & Fitne
ss</a></h3><ul class="second_level_interests"><li class="child_interest"><a href
="https://www.scribd.com/explore/Health-Fitness/Fitness" class="interest_btn int
erest_link" data-interest_name="Fitness">Fitness</a></li><li class="child_intere
st"><a href="https://www.scribd.com/explore/Health-Fitness/Nutrition" class="int
erest_btn interest_link" data-interest_name="Nutrition">Nutrition</a></li><li cl
ass="child_interest"><a href="https://www.scribd.com/explore/Health-Fitness/Spor
ts" class="interest_btn interest_link" data-interest_name="Sports">Sports</a></l
i><li class="child_interest"><a href="https://www.scribd.com/explore/Health-Fitn
ess/Wellness" class="interest_btn interest_link" data-interest_name="Wellness">W
ellness</a></li></ul></div><div class="interest_block"><h3 class="top_level_inte
rest parent_interest"><a href="https://www.scribd.com/explore/Lifestyle" class="
interest_btn interest_link" data-interest_name="Lifestyle">Lifestyle</a></h3><ul
class="second_level_interests"><li class="child_interest"><a href="https://www.
scribd.com/explore/Lifestyle/Arts-Languages" class="interest_btn interest_link"
data-interest_name="Arts & Languages">Arts & Languages</a></li><li class
="child_interest"><a href="https://www.scribd.com/explore/Lifestyle/Fashion-Beau
ty" class="interest_btn interest_link" data-interest_name="Fashion & Beauty"
>Fashion & Beauty</a></li><li class="child_interest"><a href="https://www.sc
ribd.com/explore/Lifestyle/Food-Wine" class="interest_btn interest_link" data-in
terest_name="Food & Wine">Food & Wine</a></li><li class="child_interest"
><a href="https://www.scribd.com/explore/Lifestyle/Home-Garden" class="interest_
btn interest_link" data-interest_name="Home & Garden">Home & Garden</a><
/li><li class="child_interest"><a href="https://www.scribd.com/explore/Lifestyle
/Travel" class="interest_btn interest_link" data-interest_name="Travel">Travel</
a></li></ul></div><div class="interest_block"><h3 class="top_level_interest pare
nt_interest"><a href="https://www.scribd.com/explore/Entertainment" class="inter
est_btn interest_link" data-interest_name="Entertainment">Entertainment</a></h3>
<ul class="second_level_interests"><li class="child_interest"><a href="https://w
ww.scribd.com/explore/Entertainment/Celebrity-Biography-Memoir" class="interest_
btn interest_link" data-interest_name="Celebrity Biography & Memoir">Celebri
ty Biography & Memoir</a></li><li class="child_interest"><a href="https://ww
w.scribd.com/explore/Entertainment/Pop-Culture" class="interest_btn interest_lin
k" data-interest_name="Pop Culture">Pop Culture</a></li></ul></div><div class="i
nterest_block"><h3 class="top_level_interest parent_interest"><a href="https://w
ww.scribd.com/explore/Biographies-History" class="interest_btn interest_link" da
ta-interest_name="Biographies & History">Biographies & History</a></h3><
ul class="second_level_interests"><li class="child_interest"><a href="https://ww
w.scribd.com/explore/Biographies-History/Biography-Memoir" class="interest_btn i
nterest_link" data-interest_name="Biography & Memoir">Biography & Memoir
</a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Biog
raphies-History/History" class="interest_btn interest_link" data-interest_name="
History">History</a></li></ul></div><div class="interest_block"><h3 class="top_l
evel_interest parent_interest"><a href="https://www.scribd.com/explore/Fiction"
class="interest_btn interest_link" data-interest_name="Fiction">Fiction</a></h3>
<ul class="second_level_interests"><li class="child_interest"><a href="https://w
ww.scribd.com/explore/Fiction/Children-s-YA" class="interest_btn interest_link"
data-interest_name="Children s & YA">Children s & YA</a></li><li class="child_in
terest"><a href="https://www.scribd.com/explore/Fiction/Classics" class="interes
t_btn interest_link" data-interest_name="Classic Literature">Classic Literature<
/a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Ficti
on/Contemporary-Fiction" class="interest_btn interest_link" data-interest_name="
Contemporary Fiction">Contemporary Fiction</a></li><li class="child_interest"><a
href="https://www.scribd.com/explore/Fiction/Historical-Fiction" class="interes
t_btn interest_link" data-interest_name="Historical Fiction">Historical Fiction<
/a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Ficti
on/LGBTQ-Fiction" class="interest_btn interest_link" data-interest_name="LGBTQ F
iction">LGBTQ Fiction</a></li><li class="child_interest"><a href="https://www.sc
ribd.com/explore/Fiction/Mystery-Thriller-Crime" class="interest_btn interest_li
nk" data-interest_name="Mystery, Thriller & Crime">Mystery, Thriller & C
rime</a></li><li class="child_interest"><a href="https://www.scribd.com/explore/
Fiction/Romance" class="interest_btn interest_link" data-interest_name="Romance"
>Romance</a></li><li class="child_interest"><a href="https://www.scribd.com/expl
ore/Fiction/Science-Fiction-Fantasy" class="interest_btn interest_link" data-int
erest_name="Science Fiction & Fantasy">Science Fiction & Fantasy</a></li
></ul></div></article></div></div><div class="browse_by_content_type_container">
<h2 class="browse_by_title by_content_type">BROWSE BY CONTENT TYPE</h2><article
class="all_content_types"><ul class="content_type_list"><li><a href="https://www
.scribd.com/books" class="browse_btn content_type_btn books archive_onboarding_b
rowse_target" data-track="browse:books" data-content_type="books" data-loc="brow
se_menu"><div class="icon_and_text_wrapper"><span class="icon books icon-ic_smal
l_book_fill"></span><span class="content_type_name books">Books</span></div></a>
</li><li><a href="https://www.scribd.com/audiobooks" class="browse_btn content_t
ype_btn audiobooks " data-track="browse:audiobooks" data-content_type="audiobook
s" data-loc="browse_menu"><div class="icon_and_text_wrapper"><span class="icon a
udiobooks icon-ic_small_audiobook_fill"></span><span class="content_type_name au
diobooks">Audiobooks</span></div></a></li><li><a href="https://www.scribd.com/ar
ticles" class="browse_btn content_type_btn articles " data-track="browse:article
s" data-content_type="articles" data-loc="browse_menu"><div class="icon_and_text
_wrapper"><span class="icon articles icon-ic_small_articles_fill"></span><span c
lass="content_type_name articles">News & Magazines</span></div></a></li><li>
<a href="https://www.scribd.com/sheetmusic" class="browse_btn content_type_btn s
heet_music " data-track="browse:sheet_music" data-content_type="sheet_music" dat
a-loc="browse_menu"><div class="icon_and_text_wrapper"><span class="icon sheet_m
usic icon-ic_small_songbook_fill"></span><span class="content_type_name sheet_mu
sic">Sheet Music</span></div></a></li></ul></article></div></nav></div></div><di
v class="search_input_container"><div class="autogen_class_views_chrome_search_i
nput_container autogen_class_widgets_base" id="autogen_id_341319771" data-track_
category="search_input_container"><span class="react_mount_node" id="autogen_id_
341316533"><div class="autogen_class_views_shared_react_search_input"><div class
="search_input_container"><form class="search_form"><span class="icon-ic_search
search_icon"></span><input class="search_input" placeholder="Search" type="text"
></form></div></div></span></div></div><div class="right_tools"><button class="r
esponsive_search_btn icon_btn" style="display:none"><span class="icon icon-ic_se
arch"></span></button><a href="https://www.scribd.com/upload-document" class="ic
on_btn upload_btn" data-track="upload" aria-label="upload a document"><span clas
s="icon icon-ic_globalnav_upload"></span><span class="icon_btn_text">Upload</spa
n></a><a href="https://www.scribd.com/saved" class="icon_btn library_btn archive
_onboarding_library_target" data-track="saved" arial-label="go to your library">
<span class="icon icon-ic_globalnav_saved_fill"></span><span class="icon_btn_tex
t">Saved</span></a><button class="autogen_class_views_chrome_user_util autogen_c
lass_widgets_base user_util user_util_btn" id="autogen_id_341317851" aria-label
="User Settings"><div class="user_menu_btn"><div class="autogen_class_views_shar
ed_persona_icon autogen_class_widgets_base persona_icon small" id="autogen_id_34
1338816" style="background-image: url(https://imgv2-2-f.scribdassets.com/img/wor
d_user/358063782/40x40/0119fa7b13/1494924483);"></div></div><div class="overflow
_icon icon-ic_overflowmenu"></div></button><div class="autogen_class_views_chrom
e_user_menu autogen_class_widgets_base user_menu logged_in" id="autogen_id_3413
39137"><span class="settings_menu_close_btn icon-ic_close" arial-label="close us
er settings menu"></span><div class="top"><div class="greeting user_name_row">Hi
, Asus Hael!</div></div><ul class="list"><div class="section_separator"></div><d
iv class="row_section"><li><a class="row view_profile_row" data-track="user_util
_view_profile_row" href="https://www.scribd.com/user/358063782/Asus-Hael">Public
Profile</a></li><li><a class="row account_btn" data-track="user_util_account" h
ref="/account-settings">Account Settings</a></li></div><div class="section_separ
ator"></div><div class="row_section"><li><a class="row upload_action_btn" data-t
rack="user_util_upload_action" href="https://www.scribd.com/upload-document">Upl
oad A Document</a></li><li><a class="row uploads_btn" data-track="user_util_my_u
ploads" href="/uploads">Document Uploads</a></li></div><div class="section_separ
ator"></div><div class="row_section"><li><a class="row invite_friends_btn" data
-track="user_util_referrals" href="https://www.scribd.com/referrals?source=user_
nav">Read for Free</a></li></div><div class="section_separator"></div><div class
="row_section"><li><a class="row help_btn" data-track="user_util_help" href="htt
p://support.scribd.com/login">Help</a></li><li><a class="row sign_out_btn" data-
track="user_util_log_out" href="/logout" return_to="/document/290788315/Notes-fo
r-Presentation-Malware">Sign Out</a></li></div></ul></div></div></header><div cl
ass="header_lower responsive_search"><div class="search_suggester_container"><di
v class="search_input_container"><div class="autogen_class_views_chrome_search_i
nput_container autogen_class_widgets_base" id="autogen_id_341336871" data-track_
category="search_input_container"><span class="react_mount_node" id="autogen_id_
341337306"><div class="autogen_class_views_shared_react_search_input"><div class
="search_input_container"><form class="search_form"><span class="icon-ic_search
search_icon"></span><input class="search_input" placeholder="Search" type="text"
></form></div></div></span></div></div><button class="close_responsive_search_bt
n icon-ic_close"></button></div></div></div><div class="global_wrapper"><div cla
ss="autogen_class_views_pdfs_show autogen_class_widgets_base" id="autogen_id_341
323444" data-track_category="pdfs" itemscope itemtype="http://schema.org/Creativ
eWork"><div style="height: 0; overflow: hidden"></div><div class="document_colum
ns_wrapper"><div class="sidebar_column"><div class="autogen_class_views_pdfs_sid
ebar autogen_class_widgets_base" id="autogen_id_341326497" data-track_category="
sidebar"><div class="padded_sidebar"><h1>Notes for Presentation Malware</h1><div
class="publish_info">Uploaded by <a href="https://www.scribd.com/user/56189718/
Erin-Jennings">Erin Jennings</a> on <span itemprop="dateCreated" class="publish_
date">Nov 23, 2015</span></div><div class="interest_pills"><a class="interest in
terest_link interest_pill" href="https://www.scribd.com/interest/Malware/explore
" data-category_id="36329">Malware</a><a class="interest interest_link interest_
pill" href="https://www.scribd.com/interest/Ransomware/explore" data-category_id
="55851">Ransomware</a><a class="interest interest_link interest_pill" href="htt
ps://www.scribd.com/interest/Computer-Security/explore" data-category_id="29476"
>Computer Security</a><a class="interest interest_link interest_pill" href="http
s://www.scribd.com/interest/Information-Governance/explore" data-category_id="47
477">Information Governance</a><a class="interest interest_link interest_pill" h
ref="https://www.scribd.com/interest/Computer-Security-Exploits/explore" data-ca
tegory_id="45685">Computer Security Exploits</a></div><div class="ratings_spacer
"><span class="react_mount_node" id="autogen_id_341327615" itemprop="aggregateRa
ting" itemscope itemtype="http://schema.org/AggregateRating"><div class="autogen
_class_views_shared_react_upvotes"><span itemprop="ratingValue">0.0</span> (<spa
n itemprop="ratingCount">0</span>)</div></span></div><!--total_views:93--><div c
lass="document_actions"><button class="action_button download_btn flat_btn"><spa
n class="scribd_spinner permanent_rotation" data-size="30"></span><span class="f
lat_btn_content">Download</span></button><span class="react_mount_node" id="auto
gen_id_341324130"><div class="library_button"></div></span></div><div class="sha
re_row"><div class="autogen_class_views_shared_sharing_buttons autogen_class_wid
gets_base sharing_buttons single_line" id="autogen_id_341325231" data-sharing_op
ts="{"title":"Notes for Presentation Malware","url"
;:"https://www.scribd.com/document/290788315/Notes-for-Presentation-Malware
","description":"Malware Presentation for co...","
thumbnail_url":"https://imgv2-1-f.scribdassets.com/img/document/290788
315/original/e1015d07c4/1494924483"}"><div class="facebook share_button"><a
href="#" class="share_facebook_btn" aria-label="Share on Facebook"><span class=
"icon icon-ic_facebook"></span></a></div><div class="twitter share_button"><a hr
ef="#" data-url="/book/290788315/Notes-for-Presentation-Malware" class="share_tw
itter_btn" data-text="I m reading Notes for Presentation Malware on @Scribd #ReadMor
e" aria-label="Share on Twitter"><span class="icon icon-ic_twitter"></span></a><
/div><div class="linkedin share_button"><a href="#" class="share_linkedin_btn" a
ria-label="Share on LinkedIn"><span class="icon icon-ic_linkedin"></span></a></d
iv><div class="email share_button"><a target="_blank" href="mailto:?subject=Read
%20Notes%20for%20Presentation%20Malware%20on%20Scribd&body=Hi%20there%2C%20I
%E2%80%99m%20reading%20Notes%20for%20Presentation%20Malware%20on%20Scribd%20and%
20thought%20you%20might%20like%20it.%20Notes%20for%20Presentation%20Malware%20by
%20Erin%20Jennings%20https%3A%2F%2Fwww.scribd.com%2Fbook%2F290788315%2FNotes-for
-Presentation-Malware%20Scribd%20gives%20you%20monthly%20access%20to%20books%2C%
20audiobooks%2C%20and%20more%20-%20for%20less%20than%20the%20cost%20of%20a%20pap
erback.%20Join%20today%20and%20read%20free%20for%2030%20days.%20Find%20out%20mor
e%20at%3A%20http%3A%2F%2Fwww.scribd.com%2F" rel="nofollow" data-track="share_ema
il_btn" aria-label="Share by email"><span class="icon icon-ic_email"></span></a>
</div></div><div class="embed_cell"><a href="#" class="embed_btn" data-lightbox_
url="https://www.scribd.com/read/embed_dialog?id=290788315"><span class="icon ic
on-ic_embed"></span>Embed</a></div></div><div class="description"><div class="de
scription_content"><strong>Description: </strong>Malware Presentation for comput
er crime law</div><div class="see_more_row"><a href="#" class="see_more_btn text
_btn_alt">View More</a></div></div><div class="full_description visually_hidden"
><div class="description_text">Malware Presentation for computer crime law</div>
<div class="data_row"><strong>Copyright: </strong> All Rights Reserved</div><div c
lass="data_row"><strong>Download</strong> as DOCX, PDF, TXT or read online from
Scribd</div><div class="flag_document data_row"><a class="flag_document_btn" hre
f="javascript:void(0)" data-lightbox_url="https://www.scribd.com/read/flag_dialo
g?id=290788315">Flag for inappropriate content</a></div></div>
<div class="autogen_class_views_pdfs_ssi_recommendations autogen_class_widgets_b
ase" id="autogen_id_503778663"><div class="grouped_recommenders sidebar_recommen
der"><div class="recommender_group" data-track_opts="{"compilation_id"
:"8IbulvcG1Nw2brzpWJNQBdys3lg=","module_id":"N2a3+Mutgu
orSFwcDBPpPFNyuho=","widget_name":"right sidebar"}"><h3
class="autogen_class_views_pdfs_ssi_recommendations_recommender_title autogen_c
lass_widgets_base" id="autogen_id_503777555">Documents Similar To Notes for Pres
entation Malware</h3><div class="autogen_class_views_pdfs_sidebar_document_cells
autogen_class_widgets_base has_document_cells" id="autogen_id_503776001"><ul cl
ass="autogen_class_views_shared_carousels_document_cells autogen_class_widgets_b
ase" id="autogen_id_503783329"><li class="document_cell object_cell " data-obje
ct_type="document" data-object_id="328970290" data-track="select_all_recommendat
ions" data-track_uuid="HGwEnYWz1pJdANUuBnt8/fz2tQs=" data-reading_progress="0"><
a href="https://www.scribd.com/document/328970290/Best-Practices-for-Dealing-Wit
h-Phishing-and-Ransomware-pdf" class="doc_link "><div class="thumb object_cell_h
over " style=""><img src="https://imgv2-1-f.scribdassets.com/img/document/328970
290/fit_to_size/108x144/ebaad891f6/1477490595" srcset="https://imgv2-1-f.scribda
ssets.com/img/document/328970290/fit_to_size/108x144/ebaad891f6/1477490595 1x, h
ttps://imgv2-1-f.scribdassets.com/img/document/328970290/fit_to_size/216x288/60a
75d9760/1477490595 2x" alt="document"><div class="reading_progress_outer"><div c
lass="reading_progress_outer_dark_overlay"></div><div class="reading_progress_in
ner reading_progress_percentage" style="width: 0%"></div></div><div class="shado
w_overlay"></div><div class="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"></div><div class="related_data"><div><span class="related_title
">Best Practices for Dealing With Phishing and Ransomware.pdf</span></div><div c
lass="related_publisher"><span class="decorative">by</span> MasterPirate</div></
div></a></li><li class="document_cell object_cell " data-object_type="document"
data-object_id="55693580" data-track="select_all_recommendations" data-track_uu
id="V9DAmCQt+v5gjB6eC1lFfDPDrNg=" data-reading_progress="0"><a href="https://www
.scribd.com/document/55693580/Ds-Endpoint-Protection-Suite" class="doc_link "><d
iv class="thumb object_cell_hover " style=""><img src="https://imgv2-1-f.scribda
ssets.com/img/document/55693580/fit_to_size/108x144/69a3905867/1405915636" srcse
t="https://imgv2-1-f.scribdassets.com/img/document/55693580/fit_to_size/108x144/
69a3905867/1405915636 1x, https://imgv2-2-f.scribdassets.com/img/document/556935
80/fit_to_size/216x288/844a07aef1/1405915636 2x" alt="document"><div class="read
ing_progress_outer"><div class="reading_progress_outer_dark_overlay"></div><div
class="reading_progress_inner reading_progress_percentage" style="width: 0%"></d
iv></div><div class="shadow_overlay"></div><div class="action_layer"><div class=
"main_action"><div class="read_icon icon-ic_tableofcontents"></div><div class="p
lay_icon icon-ic_audiobook_play_large"></div></div><div class="overlay"></div></
div></div><div class="under_title_wrapper"></div><div class="related_data"><div>
<span class="related_title">Ds Endpoint Protection Suite</span></div><div class=
"related_publisher"><span class="decorative">by</span> alanyip168</div></div></a
></li><li class="document_cell object_cell " data-object_type="document" data-o
bject_id="337338756" data-track="select_all_recommendations" data-track_uuid="Jp
p00rpjSJ0xpBpyaX/iq0ajNp0=" data-reading_progress="0"><a href="https://www.scrib
d.com/document/337338756/Fort-i-Sandbox" class="doc_link "><div class="thumb obj
ect_cell_hover " style=""><img src="https://imgv2-2-f.scribdassets.com/img/docum
ent/337338756/fit_to_size/108x144/7f36719080/1485200200" srcset="https://imgv2-2
-f.scribdassets.com/img/document/337338756/fit_to_size/108x144/7f36719080/148520
0200 1x, https://imgv2-2-f.scribdassets.com/img/document/337338756/fit_to_size/2
16x288/0a86d8bd72/1485200200 2x" alt="document"><div class="reading_progress_out
er"><div class="reading_progress_outer_dark_overlay"></div><div class="reading_p
rogress_inner reading_progress_percentage" style="width: 0%"></div></div><div cl
ass="shadow_overlay"></div><div class="action_layer"><div class="main_action"><d
iv class="read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic
_audiobook_play_large"></div></div><div class="overlay"></div></div></div><div c
lass="under_title_wrapper"></div><div class="related_data"><div><span class="rel
ated_title">Fort i Sandbox</span></div><div class="related_publisher"><span clas
s="decorative">by</span> Pablo Daniel Mio</div></div></a></li></ul></div></div><di
v class="recommender_group" data-track_opts="{"compilation_id":"8
IbulvcG1Nw2brzpWJNQBdys3lg=","module_id":"DptMFYFLDvkwurl9Bk
6M50UHswg=","widget_name":"right sidebar"}"><h3 class="
autogen_class_views_pdfs_ssi_recommendations_recommender_title autogen_class_wid
gets_base" id="autogen_id_503782827"><a class="title_link" href="https://www.scr
ibd.com/interest/Malware/docs" data-track data-track_rats="mc" data-track_uuid="
DptMFYFLDvkwurl9Bk6M50UHswg=">Documents About Malware</a></h3><div class="autoge
n_class_views_pdfs_sidebar_document_cells autogen_class_widgets_base has_documen
t_cells" id="autogen_id_503781461"><ul class="autogen_class_views_shared_carouse
ls_document_cells autogen_class_widgets_base" id="autogen_id_503780513"><li clas
s="document_cell object_cell " data-object_type="document" data-object_id="2559
79726" data-track="trending" data-track_uuid="9Oc37Zxxa/qoCVeBiTw2+aDx5mc=" data
-reading_progress="0"><a href="https://www.scribd.com/document/255979726/Equatio
n-Group-Questions-and-Answers" class="doc_link "><div class="thumb object_cell_h
over " style=""><img src="https://imgv2-2-f.scribdassets.com/img/document/255979
726/fit_to_size/108x144/1e8b54231a/1490777863" srcset="https://imgv2-2-f.scribda
ssets.com/img/document/255979726/fit_to_size/108x144/1e8b54231a/1490777863 1x, h
ttps://imgv2-1-f.scribdassets.com/img/document/255979726/fit_to_size/216x288/e4b
53a9490/1490777863 2x" alt="document"><div class="reading_progress_outer"><div c
lass="reading_progress_outer_dark_overlay"></div><div class="reading_progress_in
ner reading_progress_percentage" style="width: 0%"></div></div><div class="shado
w_overlay"></div><div class="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"></div><div class="related_data"><div><span class="related_title
">Equation Group Questions and Answers</span></div><div class="related_publisher
"><span class="decorative">by</span> zerohedge</div></div></a></li><li class="do
cument_cell object_cell " data-object_type="document" data-object_id="36404495"
data-track="trending" data-track_uuid="+ZE2MsBPK8y8xJqlumEdWbyUadM=" data-readi
ng_progress="0"><a href="https://www.scribd.com/document/36404495/IBM-X-Force-Vu
lnerability-Threats-1H2010" class="doc_link "><div class="thumb object_cell_hove
r " style=""><img src="https://imgv2-2-f.scribdassets.com/img/document/36404495/
fit_to_size/108x144/706a21ced4/1363638672" srcset="https://imgv2-2-f.scribdasset
s.com/img/document/36404495/fit_to_size/108x144/706a21ced4/1363638672 1x, https:
//imgv2-2-f.scribdassets.com/img/document/36404495/fit_to_size/216x288/f0f5f0bf9
3/1363638672 2x" alt="document"><div class="reading_progress_outer"><div class="
reading_progress_outer_dark_overlay"></div><div class="reading_progress_inner re
ading_progress_percentage" style="width: 0%"></div></div><div class="shadow_over
lay"></div><div class="action_layer"><div class="main_action"><div class="read_i
con icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_play_
large"></div></div><div class="overlay"></div></div></div><div class="under_titl
e_wrapper"></div><div class="related_data"><div><span class="related_title">IBM
X-Force Vulnerability Threats 1H2010</span></div><div class="related_publisher">
<span class="decorative">by</span> TechCrunch</div></div></a></li><li class="doc
ument_cell object_cell " data-object_type="document" data-object_id="282565441"
data-track="trending" data-track_uuid="newKmRP7lWO0I76CHCKGmwvqavQ=" data-readi
ng_progress="0"><a href="https://www.scribd.com/doc/282565441/Framing-Dependenci
es-Introduced-by-Underground-Commoditization" class="doc_link "><div class="thum
b object_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.com/img/
document/282565441/fit_to_size/108x144/82edcc1b2d/1445135583" srcset="https://im
gv2-1-f.scribdassets.com/img/document/282565441/fit_to_size/108x144/82edcc1b2d/1
445135583 1x, https://imgv2-1-f.scribdassets.com/img/document/282565441/fit_to_s
ize/216x288/dcdffb542b/1445135583 2x" alt="document"><div class="reading_progres
s_outer"><div class="reading_progress_outer_dark_overlay"></div><div class="read
ing_progress_inner reading_progress_percentage" style="width: 0%"></div></div><d
iv class="shadow_overlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div class="play_icon ic
on-ic_audiobook_play_large"></div></div><div class="overlay"></div></div></div><
div class="under_title_wrapper"></div><div class="related_data"><div><span class
="related_title">Framing Dependencies Introduced by Underground Commoditization<
/span></div><div class="related_publisher"><span class="decorative">by</span> An
dy Greenberg</div></div></a></li></ul></div></div><div class="recommender_group"
data-track_opts="{"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=
","module_id":"eabG2pQt6DwIXCMsd6CQ3DOfnEg=","widg
et_name":"right sidebar"}"><h3 class="autogen_class_views_pdfs_ss
i_recommendations_recommender_title autogen_class_widgets_base" id="autogen_id_5
03787955"><a class="title_link" href="https://www.scribd.com/interest/Computer-S
ecurity/docs" data-track data-track_rats="mc" data-track_uuid="eabG2pQt6DwIXCMsd
6CQ3DOfnEg=">Documents About Computer Security</a></h3><div class="autogen_class
_views_pdfs_sidebar_document_cells autogen_class_widgets_base has_document_cells
" id="autogen_id_503786802"><ul class="autogen_class_views_shared_carousels_docu
ment_cells autogen_class_widgets_base" id="autogen_id_503785931"><li class="docu
ment_cell object_cell " data-object_type="document" data-object_id="333290070"
data-track="trending" data-track_uuid="/AuF2+1gNYqqAoG3PKuJokTYxKM=" data-readin
g_progress="0"><a href="https://www.scribd.com/document/333290070/FCC-Response-1
2-05-2016" class="doc_link "><div class="thumb object_cell_hover " style=""><img
src="https://imgv2-1-f.scribdassets.com/img/document/333290070/fit_to_size/108x
144/ee7ee8c106/1481169383" srcset="https://imgv2-1-f.scribdassets.com/img/docume
nt/333290070/fit_to_size/108x144/ee7ee8c106/1481169383 1x, https://imgv2-1-f.scr
ibdassets.com/img/document/333290070/fit_to_size/216x288/f7dabf53ed/1481169383 2
x" alt="document"><div class="reading_progress_outer"><div class="reading_progre
ss_outer_dark_overlay"></div><div class="reading_progress_inner reading_progress
_percentage" style="width: 0%"></div></div><div class="shadow_overlay"></div><di
v class="action_layer"><div class="main_action"><div class="read_icon icon-ic_ta
bleofcontents"></div><div class="play_icon icon-ic_audiobook_play_large"></div><
/div><div class="overlay"></div></div></div><div class="under_title_wrapper"></d
iv><div class="related_data"><div><span class="related_title">FCC Response 12-05
-2016</span></div><div class="related_publisher"><span class="decorative">by</sp
an> MarkWarner</div></div></a></li><li class="document_cell object_cell " data-
object_type="document" data-object_id="290177134" data-track="trending" data-tra
ck_uuid="5FUQRU4PLaLojxyY+FeR8vTlKIs=" data-reading_progress="0"><a href="https:
//www.scribd.com/doc/290177134/IS-Encryption-Guide" class="doc_link "><div class
="thumb object_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.co
m/img/document/290177134/fit_to_size/108x144/0561298dda/1451534045" srcset="http
s://imgv2-1-f.scribdassets.com/img/document/290177134/fit_to_size/108x144/056129
8dda/1451534045 1x, https://imgv2-1-f.scribdassets.com/img/document/290177134/fi
t_to_size/216x288/97accccd96/1451534045 2x" alt="document"><div class="reading_p
rogress_outer"><div class="reading_progress_outer_dark_overlay"></div><div class
="reading_progress_inner reading_progress_percentage" style="width: 0%"></div></
div><div class="shadow_overlay"></div><div class="action_layer"><div class="main
_action"><div class="read_icon icon-ic_tableofcontents"></div><div class="play_i
con icon-ic_audiobook_play_large"></div></div><div class="overlay"></div></div><
/div><div class="under_title_wrapper"></div><div class="related_data"><div><span
class="related_title">IS Encryption Guide</span></div><div class="related_publi
sher"><span class="decorative">by</span> AlyssaBereznak</div></div></a></li><li
class="document_cell object_cell " data-object_type="document" data-object_id="
28994827" data-track="trending" data-track_uuid="VphbWCLYJtRhssc8f/WydXm8Oo8=" d
ata-reading_progress="0"><a href="https://www.scribd.com/document/28994827/USA-T
ODAY-Collegiate-Case-Study-Cybercrime" class="doc_link "><div class="thumb objec
t_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.com/img/documen
t/28994827/fit_to_size/108x144/700de10431/1358918063" srcset="https://imgv2-1-f.
scribdassets.com/img/document/28994827/fit_to_size/108x144/700de10431/1358918063
1x, https://imgv2-2-f.scribdassets.com/img/document/28994827/fit_to_size/216x28
8/557347933f/1358918063 2x" alt="document"><div class="reading_progress_outer"><
div class="reading_progress_outer_dark_overlay"></div><div class="reading_progre
ss_inner reading_progress_percentage" style="width: 0%"></div></div><div class="
shadow_overlay"></div><div class="action_layer"><div class="main_action"><div cl
ass="read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audi
obook_play_large"></div></div><div class="overlay"></div></div></div><div class=
"under_title_wrapper"></div><div class="related_data"><div><span class="related_
title">USA TODAY Collegiate Case Study: Cybercrime</span></div><div class="relat
ed_publisher"><span class="decorative">by</span> USA TODAY Education</div></div>
</a></li></ul></div></div></div><div class="footer_rec_docs_html" data-html="<di
v class="footer_rec_docs discover"><div class="autogen_class_view
s_discover_recommenders autogen_class_widgets_base" id="autogen_id_503
784340"><div class="main_column"><div class="recommenders&qu
ot;><div class="autogen_class_views_discover_modules_carousel document_caro
usel module_row autogen_class_views_shared_carousels_carousel autogen_class_widg
ets_base has_paddles has_document_cells carousel_widget show_title document_caro
usel regular_doc_thumb_width" id="autogen_id_503791075" data-lazy
_images="true"><div class="carousel_wrap"><h3 class="ca
rousel_title" data-track="select_all_recommendations">Documents S
imilar To Notes for Presentation Malware</h3><a href="#skip_carousel"
class="carousel_skip_link">Skip carousel</a><div class="carousel_
outer"><div class="carousel"><div class="carousel_scrolling&
quot;><ul class="autogen_class_views_shared_carousels_document_cells autoge
n_class_widgets_base" id="autogen_id_503790382"><li class="d
ocument_cell object_cell " data-object_type="document" data-obje
ct_id="328970290" data-track="select_all_recommendations" da
ta-track_uuid="HGwEnYWz1pJdANUuBnt8/fz2tQs=" data-reading_progress=&qu
ot;0"><a href="https://www.scribd.com/document/328970290/Best-Practice
s-for-Dealing-With-Phishing-and-Ransomware-pdf" class="doc_link "
><div class="thumb object_cell_hover " style=""><img data-sr
c="https://imgv2-2-f.scribdassets.com/img/document/328970290/fit_to_size/14
4x192/a051281653/1477490595" data-srcset="https://imgv2-2-f.scribdasse
ts.com/img/document/328970290/fit_to_size/144x192/a051281653/1477490595 1x, http
s://imgv2-2-f.scribdassets.com/img/document/328970290/fit_to_size/288x384/a461bf
493a/1477490595 2x" class="lazy_loading" alt="document"
><div class="shadow_overlay"></div><div class="action_layer"
><div class="main_action"><div class="read_icon icon-ic_tableofco
ntents"></div><div class="play_icon icon-ic_audiobook_play_large"
></div></div><div class="overlay"></div></div></div><div class="u
nder_title_wrapper"><div class="under_title">Best Practices for D
ealing With Phishing and Ransomware.pdf</div></div></a></li><li class="docu
ment_cell object_cell " data-object_type="document" data-object_
id="55693580" data-track="select_all_recommendations" data-t
rack_uuid="V9DAmCQt+v5gjB6eC1lFfDPDrNg=" data-reading_progress="0
"><a href="https://www.scribd.com/document/55693580/Ds-Endpoint-Protec
tion-Suite" class="doc_link "><div class="thumb object_cell_
hover " style=""><img data-src="https://imgv2-1-f.scribdasse
ts.com/img/document/55693580/fit_to_size/144x192/548e42c447/1405915636" dat
a-srcset="https://imgv2-1-f.scribdassets.com/img/document/55693580/fit_to_s
ize/144x192/548e42c447/1405915636 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/55693580/fit_to_size/288x384/fe42cb0a37/1405915636 2x" class="la
zy_loading" alt="document"><div class="shadow_overlay">
</div><div class="action_layer"><div class="main_action"><di
v class="read_icon icon-ic_tableofcontents"></div><div class="pla
y_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&q
uot;></div></div></div><div class="under_title_wrapper"><div class=&qu
ot;under_title">Ds Endpoint Protection Suite</div></div></a></li><li class=
"document_cell object_cell " data-object_type="document" da
ta-object_id="337338756" data-track="select_all_recommendations&q
uot; data-track_uuid="Jpp00rpjSJ0xpBpyaX/iq0ajNp0=" data-reading_progr
ess="0"><a href="https://www.scribd.com/document/337338756/Fort-i
-Sandbox" class="doc_link "><div class="thumb object_cell_ho
ver " style=""><img data-src="https://imgv2-2-f.scribdassets
.com/img/document/337338756/fit_to_size/144x192/becea31d66/1485200200" data
-srcset="https://imgv2-2-f.scribdassets.com/img/document/337338756/fit_to_s
ize/144x192/becea31d66/1485200200 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/337338756/fit_to_size/288x384/bc568e4ffa/1485200200 2x" class="l
azy_loading" alt="document"><div class="shadow_overlay"
></div><div class="action_layer"><div class="main_action"><d
iv class="read_icon icon-ic_tableofcontents"></div><div class="pl
ay_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&
quot;></div></div></div><div class="under_title_wrapper"><div class=&q
uot;under_title">Fort i Sandbox</div></div></a></li><li class="documen
t_cell object_cell " data-object_type="document" data-object_id=
"66445977" data-track="select_all_recommendations" data-trac
k_uuid="+RiHJjUijguvXYNEvCXZ7uWJGYs=" data-reading_progress="0&qu
ot;><a href="https://www.scribd.com/document/66445977/Whitepaper-8-Things-T
hat-Could-Affect-IT-Security" class="doc_link "><div class="
thumb object_cell_hover " style=""><img data-src="https://im
gv2-1-f.scribdassets.com/img/document/66445977/fit_to_size/144x192/04a3d5a383/13
99925335" data-srcset="https://imgv2-1-f.scribdassets.com/img/document
/66445977/fit_to_size/144x192/04a3d5a383/1399925335 1x, https://imgv2-2-f.scribd
assets.com/img/document/66445977/fit_to_size/288x384/72be0fcafc/1399925335 2x&qu
ot; class="lazy_loading" alt="document"><div class="sha
dow_overlay"></div><div class="action_layer"><div class="mai
n_action"><div class="read_icon icon-ic_tableofcontents"></div><d
iv class="play_icon icon-ic_audiobook_play_large"></div></div><div cla
ss="overlay"></div></div></div><div class="under_title_wrapper&qu
ot;><div class="under_title">Whitepaper 8 Things That Could Affect IT
Security</div></div></a></li><li class="document_cell object_cell " d
ata-object_type="document" data-object_id="221117876" data-t
rack="select_all_recommendations" data-track_uuid="U7+sRJFRkQOtDE
dDvVw65AoSWwE=" data-reading_progress="0"><a href="https://w
ww.scribd.com/document/221117876/Computer-Security-and-You" class="doc
_link "><div class="thumb object_cell_hover " style="">
<img data-src="https://imgv2-1-f.scribdassets.com/img/document/221117876/fi
t_to_size/144x192/03c62d0d7d/1398841937" data-srcset="https://imgv2-1-
f.scribdassets.com/img/document/221117876/fit_to_size/144x192/03c62d0d7d/1398841
937 1x, https://imgv2-1-f.scribdassets.com/img/document/221117876/fit_to_size/28
8x384/bef5d5c4a9/1398841937 2x" class="lazy_loading" alt="do
cument"><div class="shadow_overlay"></div><div class="action
_layer"><div class="main_action"><div class="read_icon icon-
ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_play
_large"></div></div><div class="overlay"></div></div></div><div c
lass="under_title_wrapper"><div class="under_title">Computer
Security and You</div></div></a></li><li class="document_cell object_cell
" data-object_type="document" data-object_id="271964844&quo
t; data-track="select_all_recommendations" data-track_uuid="TijHJ
yaThG1jtUMhUPwKBemdVpU=" data-reading_progress="0"><a href="
https://www.scribd.com/document/271964844/1-4-n-1-5-Security-and-Ethics-Workbook
-by-Inqilab-Patel" class="doc_link "><div class="thumb objec
t_cell_hover " style=""><img data-src="https://imgv2-1-f.scr
ibdassets.com/img/document/271964844/fit_to_size/144x192/5066c28c37/1437284801&q
uot; data-srcset="https://imgv2-1-f.scribdassets.com/img/document/271964844
/fit_to_size/144x192/5066c28c37/1437284801 1x, https://imgv2-1-f.scribdassets.co
m/img/document/271964844/fit_to_size/288x384/f3e3c1cc0c/1437284801 2x" clas
s="lazy_loading" alt="document"><div class="shadow_over
lay"></div><div class="action_layer"><div class="main_action
"><div class="read_icon icon-ic_tableofcontents"></div><div class
="play_icon icon-ic_audiobook_play_large"></div></div><div class="
;overlay"></div></div></div><div class="under_title_wrapper"><div
class="under_title">1.4 n 1.5 Security and Ethics Workbook by Inqilab
Patel</div></div></a></li><li class="document_cell object_cell " dat
a-object_type="document" data-object_id="326590531" data-tra
ck="select_all_recommendations" data-track_uuid="JqdwEJQpOnf6qADr
qu+e7ao7jOc=" data-reading_progress="0"><a href="https://www
.scribd.com/document/326590531/Inoue-Daisuke-national-Ict-Institute" class=
"doc_link "><div class="thumb object_cell_hover " style=&quo
t;"><img data-src="https://imgv2-2-f.scribdassets.com/img/document/326
590531/fit_to_size/144x192/546e685d79/1475730598" data-srcset="https:/
/imgv2-2-f.scribdassets.com/img/document/326590531/fit_to_size/144x192/546e685d7
9/1475730598 1x, https://imgv2-1-f.scribdassets.com/img/document/326590531/fit_t
o_size/288x384/5dedcd796b/1475730598 2x" class="lazy_loading" alt
="document"><div class="shadow_overlay"></div><div class=&qu
ot;action_layer"><div class="main_action"><div class="read_i
con icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audio
book_play_large"></div></div><div class="overlay"></div></div></d
iv><div class="under_title_wrapper"><div class="under_title"
>Inoue Daisuke-national Ict Institute</div></div></a></li><li class="docume
nt_cell object_cell " data-object_type="document" data-object_id
="343423730" data-track="select_all_recommendations" data-tr
ack_uuid="Y+O0IXLaNVdnbPCBhKhrXNgl3IM=" data-reading_progress="0&
quot;><a href="https://www.scribd.com/document/343423730/Lesson1-IAO101&quo
t; class="doc_link "><div class="thumb object_cell_hover " s
tyle=""><img data-src="https://imgv2-2-f.scribdassets.com/img/doc
ument/343423730/fit_to_size/144x192/a0511dd7c0/1490807391" data-srcset=&quo
t;https://imgv2-2-f.scribdassets.com/img/document/343423730/fit_to_size/144x192/
a0511dd7c0/1490807391 1x, https://imgv2-2-f.scribdassets.com/img/document/343423
730/fit_to_size/288x384/a6c39e315d/1490807391 2x" class="lazy_loading&
quot; alt="document"><div class="shadow_overlay"></div><div
class="action_layer"><div class="main_action"><div class=&qu
ot;read_icon icon-ic_tableofcontents"></div><div class="play_icon icon
-ic_audiobook_play_large"></div></div><div class="overlay"></div>
</div></div><div class="under_title_wrapper"><div class="under_ti
tle">Lesson1_IAO101</div></div></a></li><li class="document_cell objec
t_cell " data-object_type="document" data-object_id="346741
164" data-track="select_all_recommendations" data-track_uuid=&quo
t;DNkpQTxN5btuIRONIEWA1ta1CR0=" data-reading_progress="0"><a href
="https://www.scribd.com/document/346741164/Facebook-and-Information-Operat
ions-v1" class="doc_link "><div class="thumb object_cell_hov
er " style=""><img data-src="https://imgv2-2-f.scribdassets.
com/img/document/346741164/fit_to_size/144x192/a65e5bbf18/1493469280" data-
srcset="https://imgv2-2-f.scribdassets.com/img/document/346741164/fit_to_si
ze/144x192/a65e5bbf18/1493469280 1x, https://imgv2-1-f.scribdassets.com/img/docu
ment/346741164/fit_to_size/288x384/6464fca5f3/1493469280 2x" class="la
zy_loading" alt="document"><div class="shadow_overlay">
</div><div class="action_layer"><div class="main_action"><di
v class="read_icon icon-ic_tableofcontents"></div><div class="pla
y_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&q
uot;></div></div></div><div class="under_title_wrapper"><div class=&qu
ot;under_title">Facebook and Information Operations v1</div></div></a></li>
<li class="document_cell object_cell " data-object_type="documen
t" data-object_id="101865221" data-track="select_all_recomme
ndations" data-track_uuid="VO2vrocvhYhtyf8jEJvoIJg0zwc=" data-rea
ding_progress="0"><a href="https://www.scribd.com/document/101865
221/2011-11-09-Larry-Clinton-BrightTalk-Webinars-Evolution-of-Cyber-Threats-and-
Pub-Policy" class="doc_link "><div class="thumb object_cell_
hover " style=""><img data-src="https://imgv2-1-f.scribdasse
ts.com/img/document/101865221/fit_to_size/144x192/579ca240bd/1343932876" da
ta-srcset="https://imgv2-1-f.scribdassets.com/img/document/101865221/fit_to
_size/144x192/579ca240bd/1343932876 1x, https://imgv2-2-f.scribdassets.com/img/d
ocument/101865221/fit_to_size/288x384/c42c04fec1/1343932876 2x" class="
;lazy_loading" alt="document"><div class="shadow_overlay&quo
t;></div><div class="action_layer"><div class="main_action">
<div class="read_icon icon-ic_tableofcontents"></div><div class="
play_icon icon-ic_audiobook_play_large"></div></div><div class="overla
y"></div></div></div><div class="under_title_wrapper"><div class=
"under_title">2011 11 09 Larry Clinton BrightTalk Webinars Evolution o
f Cyber Threats and Pub Policy</div></div></a></li><li class="document_cell
object_cell " data-object_type="document" data-object_id="
207524635" data-track="select_all_recommendations" data-track_uui
d="8wBtnobnII0Vo0SB58vJm3PPJwk=" data-reading_progress="0"><
a href="https://www.scribd.com/document/207524635/Get-Rid-of-ShopGlider-Dea
ls-Program-From-Your-Windows-System" class="doc_link "><div class
="thumb object_cell_hover " style=""><img data-src="htt
ps://imgv2-1-f.scribdassets.com/img/document/207524635/fit_to_size/144x192/91695
71bc6/1392639641" data-srcset="https://imgv2-1-f.scribdassets.com/img/
document/207524635/fit_to_size/144x192/9169571bc6/1392639641 1x, https://imgv2-1
-f.scribdassets.com/img/document/207524635/fit_to_size/288x384/c9745ff6ba/139263
9641 2x" class="lazy_loading" alt="document"><div class
="shadow_overlay"></div><div class="action_layer"><div class
="main_action"><div class="read_icon icon-ic_tableofcontents"
;></div><div class="play_icon icon-ic_audiobook_play_large"></div></di
v><div class="overlay"></div></div></div><div class="under_title_
wrapper"><div class="under_title">Get Rid of ShopGlider Deals Pro
gram From Your Windows System</div></div></a></li><li class="document_cell
object_cell " data-object_type="document" data-object_id="2
83668453" data-track="select_all_recommendations" data-track_uuid
="x1lI294BdAWvWGNPQtpXlhjrgL4=" data-reading_progress="0"><a
href="https://www.scribd.com/document/283668453/Contemporary-Isometric-on-
Computer-Network-Security-and-Privacy" class="doc_link "><div cla
ss="thumb object_cell_hover " style=""><img data-src="h
ttps://imgv2-1-f.scribdassets.com/img/document/283668453/fit_to_size/144x192/d4c
db2ac06/1445826313" data-srcset="https://imgv2-1-f.scribdassets.com/im
g/document/283668453/fit_to_size/144x192/d4cdb2ac06/1445826313 1x, https://imgv2
-1-f.scribdassets.com/img/document/283668453/fit_to_size/288x384/4004bd4d9b/1445
826313 2x" class="lazy_loading" alt="document"><div cla
ss="shadow_overlay"></div><div class="action_layer"><div cla
ss="main_action"><div class="read_icon icon-ic_tableofcontents&qu
ot;></div><div class="play_icon icon-ic_audiobook_play_large"></div></
div><div class="overlay"></div></div></div><div class="under_titl
e_wrapper"><div class="under_title">Contemporary Isometric on Com
puter Network Security and Privacy</div></div></a></li><li class="document_
cell object_cell " data-object_type="document" data-object_id=&q
uot;195970101" data-track="select_all_recommendations" data-track
_uuid="QaYlbzFLM4mo0I0oJDZqogb3udk=" data-reading_progress="0&quo
t;><a href="https://www.scribd.com/document/195970101/Security-Slides"
class="doc_link "><div class="thumb object_cell_hover " sty
le=""><img data-src="https://imgv2-1-f.scribdassets.com/img/docum
ent/195970101/fit_to_size/144x192/b01a17f327/1406029323" data-srcset="
https://imgv2-1-f.scribdassets.com/img/document/195970101/fit_to_size/144x192/b0
1a17f327/1406029323 1x, https://imgv2-1-f.scribdassets.com/img/document/19597010
1/fit_to_size/288x384/d48f92be9e/1406029323 2x" class="lazy_loading&qu
ot; alt="document"><div class="shadow_overlay"></div><div cl
ass="action_layer"><div class="main_action"><div class="
;read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-i
c_audiobook_play_large"></div></div><div class="overlay"></div></
div></div><div class="under_title_wrapper"><div class="under_titl
e">Security+ Slides</div></div></a></li><li class="document_cell objec
t_cell " data-object_type="document" data-object_id="242305
306" data-track="select_all_recommendations" data-track_uuid=&quo
t;OGHg0H9PMQeJk0e5DVRRjWXolWY=" data-reading_progress="0"><a href
="https://www.scribd.com/document/242305306/Seminar-14P-Diamonds-and-Paper-
Clips-Steps-Needed-to-Make-Your-University-Cybersecure-separate-registration-is-
required-242305306" class="doc_link "><div class="thumb obje
ct_cell_hover " style=""><img data-src="https://imgv2-2-f.sc
ribdassets.com/img/document/242305306/fit_to_size/144x192/84598f52c3/1412783960&
quot; data-srcset="https://imgv2-2-f.scribdassets.com/img/document/24230530
6/fit_to_size/144x192/84598f52c3/1412783960 1x, https://imgv2-2-f.scribdassets.c
om/img/document/242305306/fit_to_size/288x384/0cf2cfed3f/1412783960 2x" cla
ss="lazy_loading" alt="document"><div class="shadow_ove
rlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div clas
s="play_icon icon-ic_audiobook_play_large"></div></div><div class=&quo
t;overlay"></div></div></div><div class="under_title_wrapper"><di
v class="under_title">Seminar 14P - Diamonds and Paper Clips</div></di
v></a></li><li class="document_cell object_cell " data-object_type=&q
uot;document" data-object_id="291912467" data-track="select_
all_recommendations" data-track_uuid="LJK1k8o2wWgXrZ8AmPCA27pyUbQ=&quo
t; data-reading_progress="0"><a href="https://www.scribd.com/doc/
291912467/u1l12-possible-threats" class="doc_link "><div class=&q
uot;thumb object_cell_hover " style=""><img data-src="https:
//imgv2-2-f.scribdassets.com/img/document/291912467/fit_to_size/144x192/40fc868c
97/1486664052" data-srcset="https://imgv2-2-f.scribdassets.com/img/doc
ument/291912467/fit_to_size/144x192/40fc868c97/1486664052 1x, https://imgv2-1-f.
scribdassets.com/img/document/291912467/fit_to_size/288x384/dd9bd3e814/148666405
2 2x" class="lazy_loading" alt="document"><div class=&q
uot;shadow_overlay"></div><div class="action_layer"><div class=&q
uot;main_action"><div class="read_icon icon-ic_tableofcontents"><
/div><div class="play_icon icon-ic_audiobook_play_large"></div></div><
div class="overlay"></div></div></div><div class="under_title_wra
pper"><div class="under_title">u1l12 possible threats </div></div
></a></li><li class="document_cell object_cell " data-object_type=&qu
ot;document" data-object_id="305381111" data-track="select_a
ll_recommendations" data-track_uuid="P6F+2cbbk8K2XrJ+uUspz0lSJxU="
; data-reading_progress="0"><a href="https://www.scribd.com/docum
ent/305381111/history-of-virtual-office-docx" class="doc_link "><
div class="thumb object_cell_hover " style=""><img data-src=
"https://imgv2-1-f.scribdassets.com/img/document/305381111/fit_to_size/144x
192/f89f20eae5/1458458594" data-srcset="https://imgv2-1-f.scribdassets
.com/img/document/305381111/fit_to_size/144x192/f89f20eae5/1458458594 1x, https:
//imgv2-2-f.scribdassets.com/img/document/305381111/fit_to_size/288x384/b0786bd2
94/1458458594 2x" class="lazy_loading" alt="document"><
div class="shadow_overlay"></div><div class="action_layer"><
div class="main_action"><div class="read_icon icon-ic_tableofcont
ents"></div><div class="play_icon icon-ic_audiobook_play_large"><
/div></div><div class="overlay"></div></div></div><div class="und
er_title_wrapper"><div class="under_title">history of virtual off
ice.docx</div></div></a></li><li class="document_cell object_cell " d
ata-object_type="document" data-object_id="309757709" data-t
rack="select_all_recommendations" data-track_uuid="gJn/pICneN/oxF
CvsUuHMfnvxss=" data-reading_progress="0"><a href="https://w
ww.scribd.com/doc/309757709/ammar-jamil-resume" class="doc_link "
><div class="thumb object_cell_hover " style=""><img data-sr
c="https://imgv2-2-f.scribdassets.com/img/document/309757709/fit_to_size/14
4x192/7c0f123d37/1486703121" data-srcset="https://imgv2-2-f.scribdasse
ts.com/img/document/309757709/fit_to_size/144x192/7c0f123d37/1486703121 1x, http
s://imgv2-1-f.scribdassets.com/img/document/309757709/fit_to_size/288x384/5213c4
9711/1486703121 2x" class="lazy_loading" alt="document"
><div class="shadow_overlay"></div><div class="action_layer"
><div class="main_action"><div class="read_icon icon-ic_tableofco
ntents"></div><div class="play_icon icon-ic_audiobook_play_large"
></div></div><div class="overlay"></div></div></div><div class="u
nder_title_wrapper"><div class="under_title">ammar jamil resume</
div></div></a></li><li class="document_cell object_cell " data-object
_type="document" data-object_id="316819631" data-track="
;select_all_recommendations" data-track_uuid="mS9WmmBVUUwCDiAsEFq2s9YW
3rc=" data-reading_progress="0"><a href="https://www.scribd.
com/presentation/316819631/Managing-Cyber-Risk" class="doc_link "
><div class="thumb object_cell_hover " style=""><img data-sr
c="https://imgv2-2-f.scribdassets.com/img/document/316819631/fit_to_size/14
4x192/992a233076/1469767501" data-srcset="https://imgv2-2-f.scribdasse
ts.com/img/document/316819631/fit_to_size/144x192/992a233076/1469767501 1x, http
s://imgv2-2-f.scribdassets.com/img/document/316819631/fit_to_size/288x384/d127fe
3f94/1469767501 2x" class="lazy_loading" alt="document"
><div class="shadow_overlay"></div><div class="action_layer"
><div class="main_action"><div class="read_icon icon-ic_tableofco
ntents"></div><div class="play_icon icon-ic_audiobook_play_large"
></div></div><div class="overlay"></div></div></div><div class="u
nder_title_wrapper"><div class="under_title">Managing Cyber Risk<
/div></div></a></li><li class="document_cell object_cell " data-objec
t_type="document" data-object_id="265883053" data-track=&quo
t;select_all_recommendations" data-track_uuid="D+rFZ85/jm0/+ty2PVe1yhq
E6NI=" data-reading_progress="0"><a href="https://www.scribd
.com/document/265883053/Document-Management-Security-Retention-02-03-Sept-2015-K
uala-Lumpur-07-08-Sept-2015-Jakarta" class="doc_link "><div class
="thumb object_cell_hover " style=""><img data-src="htt
ps://imgv2-1-f.scribdassets.com/img/document/265883053/fit_to_size/144x192/ea622
8cc00/1432051334" data-srcset="https://imgv2-1-f.scribdassets.com/img/
document/265883053/fit_to_size/144x192/ea6228cc00/1432051334 1x, https://imgv2-1
-f.scribdassets.com/img/document/265883053/fit_to_size/288x384/d74c03b30b/143205
1334 2x" class="lazy_loading" alt="document"><div class
="shadow_overlay"></div><div class="action_layer"><div class
="main_action"><div class="read_icon icon-ic_tableofcontents"
;></div><div class="play_icon icon-ic_audiobook_play_large"></div></di
v><div class="overlay"></div></div></div><div class="under_title_
wrapper"><div class="under_title">Document Management, Security &
amp;amp; Retention 02 - 03 Sept 2015 Kuala Lumpur / 07 - 08 Sept 2015 Jakarta</d
iv></div></a></li><li class="document_cell object_cell " data-object_
type="document" data-object_id="78926086" data-track="s
elect_all_recommendations" data-track_uuid="3u8p0NFdpc+SvDTv0EJkCIOc88
s=" data-reading_progress="0"><a href="https://www.scribd.co
m/document/78926086/Trojan" class="doc_link "><div class="th
umb object_cell_hover " style=""><img data-src="https://imgv
2-1-f.scribdassets.com/img/document/78926086/fit_to_size/144x192/b9a76bb7fd/1353
021772" data-srcset="https://imgv2-1-f.scribdassets.com/img/document/7
8926086/fit_to_size/144x192/b9a76bb7fd/1353021772 1x, https://imgv2-2-f.scribdas
sets.com/img/document/78926086/fit_to_size/288x384/dfb5d60e23/1353021772 2x"
; class="lazy_loading" alt="document"><div class="shado
w_overlay"></div><div class="action_layer"><div class="main_
action"><div class="read_icon icon-ic_tableofcontents"></div><div
class="play_icon icon-ic_audiobook_play_large"></div></div><div class
="overlay"></div></div></div><div class="under_title_wrapper"
;><div class="under_title">Trojan</div></div></a></li><li class="
document_cell object_cell " data-object_type="document" data-obj
ect_id="266246808" data-track="select_all_recommendations" d
ata-track_uuid="ud8jGsndUzz5FchKyH4EdNNpYGE=" data-reading_progress=&q
uot;0"><a href="https://www.scribd.com/document/266246808/1-5-1-1-Lab-
Researching-Network-Attacks-and-Security-Audit-Tools" class="doc_link
"><div class="thumb object_cell_hover " style=""><img d
ata-src="https://imgv2-2-f.scribdassets.com/img/document/266246808/fit_to_s
ize/144x192/39310664cc/1444951782" data-srcset="https://imgv2-2-f.scri
bdassets.com/img/document/266246808/fit_to_size/144x192/39310664cc/1444951782 1x
, https://imgv2-2-f.scribdassets.com/img/document/266246808/fit_to_size/288x384/
ed36f5c270/1444951782 2x" class="lazy_loading" alt="document
"><div class="shadow_overlay"></div><div class="action_layer
"><div class="main_action"><div class="read_icon icon-ic_tab
leofcontents"></div><div class="play_icon icon-ic_audiobook_play_large
"></div></div><div class="overlay"></div></div></div><div class=&
quot;under_title_wrapper"><div class="under_title">1.5.1.1 Lab -
Researching Network Attacks and Security Audit Tools</div></div></a></li><li cla
ss="document_cell object_cell " data-object_type="document"
data-object_id="168885028" data-track="select_all_recommendation
s" data-track_uuid="JCKevRWL+kGgpXVpVkp9vE6m1Ag=" data-reading_pr
ogress="0"><a href="https://www.scribd.com/document/168885028/ana
lysis" class="doc_link "><div class="thumb object_cell_hover
" style=""><img data-src="https://imgv2-1-f.scribdassets.co
m/img/document/168885028/fit_to_size/144x192/f95c4d43eb/1486500218" data-sr
cset="https://imgv2-1-f.scribdassets.com/img/document/168885028/fit_to_size
/144x192/f95c4d43eb/1486500218 1x, https://imgv2-1-f.scribdassets.com/img/docume
nt/168885028/fit_to_size/288x384/91992c0bda/1486500218 2x" class="lazy
_loading" alt="document"><div class="shadow_overlay"></
div><div class="action_layer"><div class="main_action"><div
class="read_icon icon-ic_tableofcontents"></div><div class="play_
icon icon-ic_audiobook_play_large"></div></div><div class="overlay&quo
t;></div></div></div><div class="under_title_wrapper"><div class="
;under_title">analysis</div></div></a></li><li class="document_cell ob
ject_cell " data-object_type="document" data-object_id="924
82288" data-track="select_all_recommendations" data-track_uuid=&q
uot;t0iATE11CxzlOTVDzKdg/Jt+joA=" data-reading_progress="0"><a hr
ef="https://www.scribd.com/document/92482288/Windows-7-Enterprise-Desktop-S
upport-Technician" class="doc_link "><div class="thumb objec
t_cell_hover " style=""><img data-src="https://imgv2-2-f.scr
ibdassets.com/img/document/92482288/fit_to_size/144x192/fdac78e0b2/1446163792&qu
ot; data-srcset="https://imgv2-2-f.scribdassets.com/img/document/92482288/f
it_to_size/144x192/fdac78e0b2/1446163792 1x, https://imgv2-1-f.scribdassets.com/
img/document/92482288/fit_to_size/288x384/12c0586d12/1446163792 2x" class=&
quot;lazy_loading" alt="document"><div class="shadow_overlay
"></div><div class="action_layer"><div class="main_action&qu
ot;><div class="read_icon icon-ic_tableofcontents"></div><div class=&q
uot;play_icon icon-ic_audiobook_play_large"></div></div><div class="ov
erlay"></div></div></div><div class="under_title_wrapper"><div cl
ass="under_title">Windows 7 Enterprise Desktop Support Technician</div
></div></a></li><li class="document_cell object_cell " data-object_ty
pe="document" data-object_id="71014894" data-track="sel
ect_all_recommendations" data-track_uuid="Kg0InInLycSDRKKfrM7lVf2bQzo=
" data-reading_progress="0"><a href="https://www.scribd.com/
document/71014894/Resilex-network-access-and-authentication-policy" class=&
quot;doc_link "><div class="thumb object_cell_hover " style="
;"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/7101
4894/fit_to_size/144x192/a22935da3f/1405285902" data-srcset="https://i
mgv2-1-f.scribdassets.com/img/document/71014894/fit_to_size/144x192/a22935da3f/1
405285902 1x, https://imgv2-2-f.scribdassets.com/img/document/71014894/fit_to_si
ze/288x384/45a5c2dee2/1405285902 2x" class="lazy_loading" alt=&qu
ot;document"><div class="shadow_overlay"></div><div class="a
ction_layer"><div class="main_action"><div class="read_icon
icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><
div class="under_title_wrapper"><div class="under_title">Res
ilex-network_access_and_authentication_policy</div></div></a></li><li class=&quo
t;document_cell object_cell " data-object_type="document" data-o
bject_id="93484031" data-track="select_all_recommendations"
data-track_uuid="sGKbvIN0FPupTRJYJ9ThqVDGxCI=" data-reading_progress=&
quot;0"><a href="https://www.scribd.com/presentation/93484031/Indusfac
e-Corporate-Overview" class="doc_link "><div class="thumb ob
ject_cell_hover " style=""><img data-src="https://imgv2-1-f.
scribdassets.com/img/document/93484031/fit_to_size/144x192/8b9a8652a8/1445567044
" data-srcset="https://imgv2-1-f.scribdassets.com/img/document/9348403
1/fit_to_size/144x192/8b9a8652a8/1445567044 1x, https://imgv2-2-f.scribdassets.c
om/img/document/93484031/fit_to_size/288x384/54d666e776/1445567044 2x" clas
s="lazy_loading" alt="document"><div class="shadow_over
lay"></div><div class="action_layer"><div class="main_action
"><div class="read_icon icon-ic_tableofcontents"></div><div class
="play_icon icon-ic_audiobook_play_large"></div></div><div class="
;overlay"></div></div></div><div class="under_title_wrapper"><div
class="under_title">Indusface Corporate Overview</div></div></a></li>
<li class="document_cell object_cell " data-object_type="documen
t" data-object_id="321392442" data-track="select_all_recomme
ndations" data-track_uuid="spGdpedgT5jEWdMNFnWEmlyHQJg=" data-rea
ding_progress="0"><a href="https://www.scribd.com/document/321392
442/Damballa-Network-Security-Checkup-Trend-Report" class="doc_link &q
uot;><div class="thumb object_cell_hover " style=""><img dat
a-src="https://imgv2-1-f.scribdassets.com/img/document/321392442/fit_to_siz
e/144x192/1a36e60ca3/1471379181" data-srcset="https://imgv2-1-f.scribd
assets.com/img/document/321392442/fit_to_size/144x192/1a36e60ca3/1471379181 1x,
https://imgv2-1-f.scribdassets.com/img/document/321392442/fit_to_size/288x384/81
4a36cbb3/1471379181 2x" class="lazy_loading" alt="document&q
uot;><div class="shadow_overlay"></div><div class="action_layer&q
uot;><div class="main_action"><div class="read_icon icon-ic_table
ofcontents"></div><div class="play_icon icon-ic_audiobook_play_large&q
uot;></div></div><div class="overlay"></div></div></div><div class=&qu
ot;under_title_wrapper"><div class="under_title">Damballa Network
Security Checkup Trend Report</div></div></a></li><li class="document_cell
object_cell " data-object_type="document" data-object_id="
48678456" data-track="select_all_recommendations" data-track_uuid
="SEZUJ5A6jBn6pc0qC+TRggBGhYk=" data-reading_progress="0"><a
href="https://www.scribd.com/document/48678456/HBG-McAfee" class=&quo
t;doc_link "><div class="thumb object_cell_hover " style="&q
uot;><img data-src="https://imgv2-1-f.scribdassets.com/img/document/4867845
6/fit_to_size/144x192/0316d98046/1408433841" data-srcset="https://imgv
2-1-f.scribdassets.com/img/document/48678456/fit_to_size/144x192/0316d98046/1408
433841 1x, https://imgv2-1-f.scribdassets.com/img/document/48678456/fit_to_size/
288x384/3a46bc2126/1408433841 2x" class="lazy_loading" alt="
document"><div class="shadow_overlay"></div><div class="acti
on_layer"><div class="main_action"><div class="read_icon ico
n-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_pl
ay_large"></div></div><div class="overlay"></div></div></div><div
class="under_title_wrapper"><div class="under_title">HBG-Mc
Afee</div></div></a></li><li class="document_cell object_cell " data-
object_type="document" data-object_id="336813321" data-track
="select_all_recommendations" data-track_uuid="/dDG5m4g1/z8pbxvcd
qCRpvFg4I=" data-reading_progress="0"><a href="https://www.s
cribd.com/document/336813321/mere-am-i-safe" class="doc_link "><d
iv class="thumb object_cell_hover " style=""><img data-src=&
quot;https://imgv2-2-f.scribdassets.com/img/document/336813321/fit_to_size/144x1
92/c7e40c1d88/1486742192" data-srcset="https://imgv2-2-f.scribdassets.
com/img/document/336813321/fit_to_size/144x192/c7e40c1d88/1486742192 1x, https:/
/imgv2-1-f.scribdassets.com/img/document/336813321/fit_to_size/288x384/683a44417
a/1486742192 2x" class="lazy_loading" alt="document"><d
iv class="shadow_overlay"></div><div class="action_layer"><d
iv class="main_action"><div class="read_icon icon-ic_tableofconte
nts"></div><div class="play_icon icon-ic_audiobook_play_large"></
div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"><div class="under_title">mere am i safe</div></d
iv></a></li><li class="document_cell object_cell " data-object_type=&
quot;document" data-object_id="243679973" data-track="select
_all_recommendations" data-track_uuid="gmtAQBbrsvgxzzZB8BBd+PX5hds=&qu
ot; data-reading_progress="0"><a href="https://www.scribd.com/doc
ument/243679973/ensemble-pdf" class="doc_link "><div class="
thumb object_cell_hover " style=""><img data-src="https://im
gv2-2-f.scribdassets.com/img/document/243679973/fit_to_size/144x192/2eade06f69/1
413814457" data-srcset="https://imgv2-2-f.scribdassets.com/img/documen
t/243679973/fit_to_size/144x192/2eade06f69/1413814457 1x, https://imgv2-2-f.scri
bdassets.com/img/document/243679973/fit_to_size/288x384/35bac388cd/1413814457 2x
" class="lazy_loading" alt="document"><div class="
shadow_overlay"></div><div class="action_layer"><div class="
main_action"><div class="read_icon icon-ic_tableofcontents"></div
><div class="play_icon icon-ic_audiobook_play_large"></div></div><div
class="overlay"></div></div></div><div class="under_title_wrapper
"><div class="under_title">ensemble.pdf</div></div></a></li><li c
lass="document_cell object_cell " data-object_type="document&quo
t; data-object_id="261292348" data-track="select_all_recommendati
ons" data-track_uuid="tqJ+d8g8m4pM8TkdkYr1frOYLpc=" data-reading_
progress="0"><a href="https://www.scribd.com/document/261292348/J
ewish-Voice-for-Peace-ad-on-Israeli-policy-The-Hill-5-8-15" class="doc
_link "><div class="thumb object_cell_hover " style="">
<img data-src="https://imgv2-1-f.scribdassets.com/img/document/261292348/fi
t_to_size/144x192/a5cb339d2a/1428536469" data-srcset="https://imgv2-1-
f.scribdassets.com/img/document/261292348/fit_to_size/144x192/a5cb339d2a/1428536
469 1x, https://imgv2-1-f.scribdassets.com/img/document/261292348/fit_to_size/28
8x384/4156eb53dc/1428536469 2x" class="lazy_loading" alt="do
cument"><div class="shadow_overlay"></div><div class="action
_layer"><div class="main_action"><div class="read_icon icon-
ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_play
_large"></div></div><div class="overlay"></div></div></div><div c
lass="under_title_wrapper"><div class="under_title">Jewish V
oice for Peace ad on Israeli policy, The Hill 5/8/15</div></div></a></li></ul></
div></div><div><img src="https://s2-f.scribdassets.com/images/home/logged_i
n/ic_home_control_left_arrow.png?1494885498" alt="carousel previous&qu
ot; class="paddle page_left carousel_prev" data-track="carousel:p
revious" aria-hidden="true"><img src="https://s1-f.scribdass
ets.com/images/home/logged_in/ic_home_control_right_arrow.png?1494885498" a
lt="carousel next" class="paddle page_right carousel_next" d
ata-track="carousel:next" aria-hidden="true"></div></div><di
v class="carousel_scrollbar"><div class="carousel_scrollbar_thumb
"></div></div></div></div><script type="text/javascript">
//<![CDATA[
new Scribd.UI.Carousel("#autogen_id_503791075", {"page"
;:false,"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=",&quo
t;module_id":"N2a3+MutguorSFwcDBPpPFNyuho=","widget_name&quo
t;:"document_carousel:footer","sub_module":false})
//]]>
</script><div class="autogen_class_views_discover_modules_carousel document
_carousel module_row autogen_class_views_shared_carousels_carousel autogen_class
_widgets_base has_paddles has_document_cells carousel_widget show_title document
_carousel regular_doc_thumb_width" id="autogen_id_503789742" data
-lazy_images="true"><div class="carousel_wrap"><h3 class=&qu
ot;carousel_title" data-track="trending"><a class="title_lin
k" href="https://www.scribd.com/interest/Malware/docs" data-track
data-track_rats="mc" data-track_uuid="DptMFYFLDvkwurl9Bk6M50UHsw
g=">Documents About Malware</a></h3><a href="#skip_carousel" clas
s="carousel_skip_link">Skip carousel</a><div class="carousel_oute
r"><div class="carousel"><div class="carousel_scrolling"
;><ul class="autogen_class_views_shared_carousels_document_cells autogen_cl
ass_widgets_base" id="autogen_id_503788663"><li class="docum
ent_cell object_cell " data-object_type="document" data-object_i
d="255979726" data-track="trending" data-track_uuid="9O
c37Zxxa/qoCVeBiTw2+aDx5mc=" data-reading_progress="0"><a href=&qu
ot;https://www.scribd.com/document/255979726/Equation-Group-Questions-and-Answer
s" class="doc_link "><div class="thumb object_cell_hover &qu
ot; style=""><img data-src="https://imgv2-1-f.scribdassets.com/im
g/document/255979726/fit_to_size/144x192/4e010fa57f/1490777863" data-srcset
="https://imgv2-1-f.scribdassets.com/img/document/255979726/fit_to_size/144
x192/4e010fa57f/1490777863 1x, https://imgv2-1-f.scribdassets.com/img/document/2
55979726/fit_to_size/288x384/08730911dd/1490777863 2x" class="lazy_loa
ding" alt="document"><div class="shadow_overlay"></div>
<div class="action_layer"><div class="main_action"><div clas
s="read_icon icon-ic_tableofcontents"></div><div class="play_icon
icon-ic_audiobook_play_large"></div></div><div class="overlay"><
/div></div></div><div class="under_title_wrapper"><div class="und
er_title">Equation Group Questions and Answers</div></div></a></li><li clas
s="document_cell object_cell " data-object_type="document"
data-object_id="36404495" data-track="trending" data-track_u
uid="+ZE2MsBPK8y8xJqlumEdWbyUadM=" data-reading_progress="0"
><a href="https://www.scribd.com/document/36404495/IBM-X-Force-Vulnerabilit
y-Threats-1H2010" class="doc_link "><div class="thumb object
_cell_hover " style=""><img data-src="https://imgv2-1-f.scri
bdassets.com/img/document/36404495/fit_to_size/144x192/50bd1f09bc/1363638672&quo
t; data-srcset="https://imgv2-1-f.scribdassets.com/img/document/36404495/fi
t_to_size/144x192/50bd1f09bc/1363638672 1x, https://imgv2-2-f.scribdassets.com/i
mg/document/36404495/fit_to_size/288x384/3d2c81e70b/1363638672 2x" class=&q
uot;lazy_loading" alt="document"><div class="shadow_overlay&
quot;></div><div class="action_layer"><div class="main_action&quo
t;><div class="read_icon icon-ic_tableofcontents"></div><div class=&qu
ot;play_icon icon-ic_audiobook_play_large"></div></div><div class="ove
rlay"></div></div></div><div class="under_title_wrapper"><div cla
ss="under_title">IBM X-Force Vulnerability Threats 1H2010</div></div><
/a></li><li class="document_cell object_cell " data-object_type="
;document" data-object_id="282565441" data-track="trending&q
uot; data-track_uuid="newKmRP7lWO0I76CHCKGmwvqavQ=" data-reading_progr
ess="0"><a href="https://www.scribd.com/doc/282565441/Framing-Dep
endencies-Introduced-by-Underground-Commoditization" class="doc_link &
quot;><div class="thumb object_cell_hover " style=""><img da
ta-src="https://imgv2-2-f.scribdassets.com/img/document/282565441/fit_to_si
ze/144x192/6844b6d77d/1445135583" data-srcset="https://imgv2-2-f.scrib
dassets.com/img/document/282565441/fit_to_size/144x192/6844b6d77d/1445135583 1x,
https://imgv2-1-f.scribdassets.com/img/document/282565441/fit_to_size/288x384/6
d8c7bd18d/1445135583 2x" class="lazy_loading" alt="document&
quot;><div class="shadow_overlay"></div><div class="action_layer&
quot;><div class="main_action"><div class="read_icon icon-ic_tabl
eofcontents"></div><div class="play_icon icon-ic_audiobook_play_large&
quot;></div></div><div class="overlay"></div></div></div><div class=&q
uot;under_title_wrapper"><div class="under_title">Framing Depende
ncies Introduced by Underground Commoditization</div></div></a></li><li class=&q
uot;document_cell object_cell " data-object_type="document" data
-object_id="287932833" data-track="trending" data-track_uuid
="RedA5/Eoe2zcVe2M9NOoCvser4k=" data-reading_progress="0"><a
href="https://www.scribd.com/document/287932833/CryptoWall-Report" cl
ass="doc_link "><div class="thumb object_cell_hover " style=
""><img data-src="https://imgv2-1-f.scribdassets.com/img/document
/287932833/fit_to_size/144x192/d78e5181fe/1448540856" data-srcset="htt
ps://imgv2-1-f.scribdassets.com/img/document/287932833/fit_to_size/144x192/d78e5
181fe/1448540856 1x, https://imgv2-1-f.scribdassets.com/img/document/287932833/f
it_to_size/288x384/343dffdcca/1448540856 2x" class="lazy_loading"
alt="document"><div class="shadow_overlay"></div><div class
="action_layer"><div class="main_action"><div class="re
ad_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_a
udiobook_play_large"></div></div><div class="overlay"></div></div
></div><div class="under_title_wrapper"><div class="under_title&q
uot;>CryptoWall Report</div></div></a></li><li class="document_cell object_
cell " data-object_type="document" data-object_id="30030022
8" data-track="trending" data-track_uuid="uW3mkef4Z4bYBRx6Be
pzaZ85X6I=" data-reading_progress="0"><a href="https://www.s
cribd.com/doc/300300228/Operation-Blockbuster-Report" class="doc_link
"><div class="thumb object_cell_hover " style=""><img d
ata-src="https://imgv2-2-f.scribdassets.com/img/document/300300228/fit_to_s
ize/144x192/a8b3c4e1d0/1494728639" data-srcset="https://imgv2-2-f.scri
bdassets.com/img/document/300300228/fit_to_size/144x192/a8b3c4e1d0/1494728639 1x
, https://imgv2-2-f.scribdassets.com/img/document/300300228/fit_to_size/288x384/
366d46a052/1494728639 2x" class="lazy_loading" alt="document
"><div class="shadow_overlay"></div><div class="action_layer
"><div class="main_action"><div class="read_icon icon-ic_tab
leofcontents"></div><div class="play_icon icon-ic_audiobook_play_large
"></div></div><div class="overlay"></div></div></div><div class=&
quot;under_title_wrapper"><div class="under_title">Operation Bloc
kbuster Report</div></div></a></li><li class="document_cell object_cell &q
uot; data-object_type="document" data-object_id="252398141"
data-track="trending" data-track_uuid="Vw53EcN9jODSwffTUREPYaJJBi
A=" data-reading_progress="0"><a href="https://www.scribd.co
m/document/252398141/Internet-Security-Best-Practices-2014" class="doc
_link "><div class="thumb object_cell_hover " style="">
<img data-src="https://imgv2-1-f.scribdassets.com/img/document/252398141/fi
t_to_size/144x192/e7e68e68e3/1426314604" data-srcset="https://imgv2-1-
f.scribdassets.com/img/document/252398141/fit_to_size/144x192/e7e68e68e3/1426314
604 1x, https://imgv2-2-f.scribdassets.com/img/document/252398141/fit_to_size/28
8x384/b6c41ff4b7/1426314604 2x" class="lazy_loading" alt="do
cument"><div class="shadow_overlay"></div><div class="action
_layer"><div class="main_action"><div class="read_icon icon-
ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_play
_large"></div></div><div class="overlay"></div></div></div><div c
lass="under_title_wrapper"><div class="under_title">Internet
Security Best Practices 2014</div></div></a></li><li class="document_cell
object_cell " data-object_type="document" data-object_id="2
55852040" data-track="trending" data-track_uuid="oqiLu60C8j0
W+sclAaONN8GknGI=" data-reading_progress="0"><a href="https:
//www.scribd.com/document/255852040/GCHQ-Wiki-Open-Source-for-Cyber-Defence-Prog
ress" class="doc_link "><div class="thumb object_cell_hover
" style=""><img data-src="https://imgv2-2-f.scribdassets.com
/img/document/255852040/fit_to_size/144x192/06a66729fc/1427743375" data-src
set="https://imgv2-2-f.scribdassets.com/img/document/255852040/fit_to_size/
144x192/06a66729fc/1427743375 1x, https://imgv2-2-f.scribdassets.com/img/documen
t/255852040/fit_to_size/288x384/f1586a40ab/1427743375 2x" class="lazy_
loading" alt="document"><div class="shadow_overlay"></d
iv><div class="action_layer"><div class="main_action"><div c
lass="read_icon icon-ic_tableofcontents"></div><div class="play_i
con icon-ic_audiobook_play_large"></div></div><div class="overlay"
;></div></div></div><div class="under_title_wrapper"><div class="
under_title">GCHQ Wiki - Open Source for Cyber Defence/Progress</div></div>
</a></li><li class="document_cell object_cell " data-object_type=&quo
t;document" data-object_id="100443724" data-track="trending&
quot; data-track_uuid="H/j3WtPBLolEChbZ2/NEPpKhEFQ=" data-reading_prog
ress="0"><a href="https://www.scribd.com/document/100443724/Under
standing-the-Invisible-Internet-Chase-Cunningham" class="doc_link &quo
t;><div class="thumb object_cell_hover " style=""><img data-
src="https://imgv2-2-f.scribdassets.com/img/document/100443724/fit_to_size/
144x192/9b21a799f4/1492145609" data-srcset="https://imgv2-2-f.scribdas
sets.com/img/document/100443724/fit_to_size/144x192/9b21a799f4/1492145609 1x, ht
tps://imgv2-2-f.scribdassets.com/img/document/100443724/fit_to_size/288x384/0da1
e22cd7/1492145609 2x" class="lazy_loading" alt="document&quo
t;><div class="shadow_overlay"></div><div class="action_layer&quo
t;><div class="main_action"><div class="read_icon icon-ic_tableof
contents"></div><div class="play_icon icon-ic_audiobook_play_large&quo
t;></div></div><div class="overlay"></div></div></div><div class="
;under_title_wrapper"><div class="under_title">Understanding the
Invisible Internet, Chase Cunningham</div></div></a></li><li class="documen
t_cell object_cell " data-object_type="document" data-object_id=
"225427125" data-track="trending" data-track_uuid="pWO2
BLeoLpE1Hgvlv3cpm9bSK5U=" data-reading_progress="0"><a href="
;https://www.scribd.com/document/225427125/Classification-of-Malware-based-on-Da
ta-Mining-Approach" class="doc_link "><div class="thumb obje
ct_cell_hover " style=""><img data-src="https://imgv2-2-f.sc
ribdassets.com/img/document/225427125/fit_to_size/144x192/57576e429f/1429942867&
quot; data-srcset="https://imgv2-2-f.scribdassets.com/img/document/22542712
5/fit_to_size/144x192/57576e429f/1429942867 1x, https://imgv2-1-f.scribdassets.c
om/img/document/225427125/fit_to_size/288x384/353ed67cfc/1429942867 2x" cla
ss="lazy_loading" alt="document"><div class="shadow_ove
rlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div clas
s="play_icon icon-ic_audiobook_play_large"></div></div><div class=&quo
t;overlay"></div></div></div><div class="under_title_wrapper"><di
v class="under_title">Classification of Malware based on Data Mining A
pproach</div></div></a></li><li class="document_cell object_cell " da
ta-object_type="document" data-object_id="301984300" data-tr
ack="trending" data-track_uuid="r76dUkslqpMPoRxmDIg1Ifkxsf4="
; data-reading_progress="0"><a href="https://www.scribd.com/doc/3
01984300/EFF-Amicus-Brief-in-FBI-Mass-Hacking-Case" class="doc_link &q
uot;><div class="thumb object_cell_hover " style=""><img dat
a-src="https://imgv2-1-f.scribdassets.com/img/document/301984300/fit_to_siz
e/144x192/9f28b83288/1457025889" data-srcset="https://imgv2-1-f.scribd
assets.com/img/document/301984300/fit_to_size/144x192/9f28b83288/1457025889 1x,
https://imgv2-2-f.scribdassets.com/img/document/301984300/fit_to_size/288x384/bb
68e9078b/1457025889 2x" class="lazy_loading" alt="document&q
uot;><div class="shadow_overlay"></div><div class="action_layer&q
uot;><div class="main_action"><div class="read_icon icon-ic_table
ofcontents"></div><div class="play_icon icon-ic_audiobook_play_large&q
uot;></div></div><div class="overlay"></div></div></div><div class=&qu
ot;under_title_wrapper"><div class="under_title">EFF Amicus Brief
in FBI Mass Hacking Case</div></div></a></li><li class="document_cell obje
ct_cell " data-object_type="document" data-object_id="59519
177" data-track="trending" data-track_uuid="lNvqHK7sT0HvXuWS
2EVnKKRT2ao=" data-reading_progress="0"><a href="https://www
.scribd.com/document/59519177/Cisco-Protects-Internal-Infrastructure-from-Web-Ba
sed-Threats-Case-Study" class="doc_link "><div class="thumb
object_cell_hover " style=""><img data-src="https://imgv2-1-
f.scribdassets.com/img/document/59519177/fit_to_size/144x192/b88536f135/13734277
03" data-srcset="https://imgv2-1-f.scribdassets.com/img/document/59519
177/fit_to_size/144x192/b88536f135/1373427703 1x, https://imgv2-1-f.scribdassets
.com/img/document/59519177/fit_to_size/288x384/dc0eedfe62/1373427703 2x" cl
ass="lazy_loading" alt="document"><div class="shadow_ov
erlay"></div><div class="action_layer"><div class="main_acti
on"><div class="read_icon icon-ic_tableofcontents"></div><div cla
ss="play_icon icon-ic_audiobook_play_large"></div></div><div class=&qu
ot;overlay"></div></div></div><div class="under_title_wrapper"><d
iv class="under_title">Cisco Protects Internal Infrastructure from Web
-Based Threats (Case Study)</div></div></a></li><li class="document_cell ob
ject_cell " data-object_type="document" data-object_id="206
888750" data-track="trending" data-track_uuid="vYG6S9SiS8Kwg
nkg6dXnHXkKXIc=" data-reading_progress="0"><a href="https://
www.scribd.com/document/206888750/Unveiling-Careto-The-Masked-APT" class=&q
uot;doc_link "><div class="thumb object_cell_hover " style="
"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/20688
8750/fit_to_size/144x192/0d6e196890/1402654450" data-srcset="https://i
mgv2-1-f.scribdassets.com/img/document/206888750/fit_to_size/144x192/0d6e196890/
1402654450 1x, https://imgv2-1-f.scribdassets.com/img/document/206888750/fit_to_
size/288x384/95ca156ba0/1402654450 2x" class="lazy_loading" alt=&
quot;document"><div class="shadow_overlay"></div><div class="
;action_layer"><div class="main_action"><div class="read_ico
n icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobo
ok_play_large"></div></div><div class="overlay"></div></div></div
><div class="under_title_wrapper"><div class="under_title">U
nveiling Careto - The Masked APT</div></div></a></li><li class="document_cell obj
ect_cell " data-object_type="document" data-object_id="2718
40380" data-track="trending" data-track_uuid="Cehex+zimh42ee
VHoX39tebmoIg=" data-reading_progress="0"><a href="https://w
ww.scribd.com/document/271840380/Intelligence-Report-June-2015" class="
;doc_link "><div class="thumb object_cell_hover " style="&qu
ot;><img data-src="https://imgv2-1-f.scribdassets.com/img/document/27184038
0/fit_to_size/144x192/68381680d5/1437964825" data-srcset="https://imgv
2-1-f.scribdassets.com/img/document/271840380/fit_to_size/144x192/68381680d5/143
7964825 1x, https://imgv2-1-f.scribdassets.com/img/document/271840380/fit_to_siz
e/288x384/27ff744674/1437964825 2x" class="lazy_loading" alt=&quo
t;document"><div class="shadow_overlay"></div><div class="ac
tion_layer"><div class="main_action"><div class="read_icon i
con-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_
play_large"></div></div><div class="overlay"></div></div></div><d
iv class="under_title_wrapper"><div class="under_title">Inte
lligence Report June 2015</div></div></a></li><li class="document_cell obje
ct_cell " data-object_type="document" data-object_id="28326
4720" data-track="trending" data-track_uuid="M+MtptI+hwrkRE2
tPZX5FT5l1Aw=" data-reading_progress="0"><a href="https://ww
w.scribd.com/doc/283264720/2015-Internet-Organised-Crime-Threat-Assessment"
class="doc_link "><div class="thumb object_cell_hover " sty
le=""><img data-src="https://imgv2-2-f.scribdassets.com/img/docum
ent/283264720/fit_to_size/144x192/15d2239d97/1443932195" data-srcset="
https://imgv2-2-f.scribdassets.com/img/document/283264720/fit_to_size/144x192/15
d2239d97/1443932195 1x, https://imgv2-2-f.scribdassets.com/img/document/28326472
0/fit_to_size/288x384/08183fcc94/1443932195 2x" class="lazy_loading&qu
ot; alt="document"><div class="shadow_overlay"></div><div cl
ass="action_layer"><div class="main_action"><div class="
;read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-i
c_audiobook_play_large"></div></div><div class="overlay"></div></
div></div><div class="under_title_wrapper"><div class="under_titl
e">2015 Internet Organised Crime Threat Assessment</div></div></a></li><li
class="document_cell object_cell " data-object_type="document&qu
ot; data-object_id="324253148" data-track="trending" data-tr
ack_uuid="B96sLGQVc/cvaoMxruPiYnoOB9Y=" data-reading_progress="0&
quot;><a href="https://www.scribd.com/document/324253148/Attribution-of-Mal
icious-Cyber-Incidents-From-Soup-to-Nuts" class="doc_link "><div
class="thumb object_cell_hover " style=""><img data-src=&quo
t;https://imgv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/144x192/
8f7f38f426/1479246094" data-srcset="https://imgv2-1-f.scribdassets.com
/img/document/324253148/fit_to_size/144x192/8f7f38f426/1479246094 1x, https://im
gv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/288x384/d1d93c8883/1
479246094 2x" class="lazy_loading" alt="document"><div
class="shadow_overlay"></div><div class="action_layer"><div
class="main_action"><div class="read_icon icon-ic_tableofcontents
"></div><div class="play_icon icon-ic_audiobook_play_large"></div
></div><div class="overlay"></div></div></div><div class="under_t
itle_wrapper"><div class="under_title">Attribution of Malicious C
yber Incidents</div></div></a></li><li class="document_cell object_cell &q
uot; data-object_type="document" data-object_id="201637336"
data-track="trending" data-track_uuid="EYuMkwntWNeU2ZiqDNmC7EHdt3
g=" data-reading_progress="0"><a href="https://www.scribd.co
m/document/201637336/CrowdStrike-Global-Threat-Report-2013-Year-In-Review"
class="doc_link "><div class="thumb object_cell_hover " styl
e=""><img data-src="https://imgv2-1-f.scribdassets.com/img/docume
nt/201637336/fit_to_size/144x192/6110164f9f/1394936278" data-srcset="h
ttps://imgv2-1-f.scribdassets.com/img/document/201637336/fit_to_size/144x192/611
0164f9f/1394936278 1x, https://imgv2-2-f.scribdassets.com/img/document/201637336
/fit_to_size/288x384/3ab035b135/1394936278 2x" class="lazy_loading&quo
t; alt="document"><div class="shadow_overlay"></div><div cla
ss="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic
_audiobook_play_large"></div></div><div class="overlay"></div></d
iv></div><div class="under_title_wrapper"><div class="under_title
">CrowdStrike Global Threat Report</div></div></a></li><li class="docu
ment_cell object_cell " data-object_type="document" data-object_
id="236784088" data-track="trending" data-track_uuid="N
Sfccf4nwx2KOvxiXjPtJB5/BZ8=" data-reading_progress="0"><a href=&q
uot;https://www.scribd.com/document/236784088/A-Survey-of-Botnet-Detection-Techn
iques" class="doc_link "><div class="thumb object_cell_hover
" style=""><img data-src="https://imgv2-1-f.scribdassets.co
m/img/document/236784088/fit_to_size/144x192/d7df3f51c5/1408001732" data-sr
cset="https://imgv2-1-f.scribdassets.com/img/document/236784088/fit_to_size
/144x192/d7df3f51c5/1408001732 1x, https://imgv2-1-f.scribdassets.com/img/docume
nt/236784088/fit_to_size/288x384/a82640c50b/1408001732 2x" class="lazy
_loading" alt="document"><div class="shadow_overlay"></
div><div class="action_layer"><div class="main_action"><div
class="read_icon icon-ic_tableofcontents"></div><div class="play_
icon icon-ic_audiobook_play_large"></div></div><div class="overlay&quo
t;></div></div></div><div class="under_title_wrapper"><div class="
;under_title">A Survey of Botnet Detection Techniques</div></div></a></li><
li class="document_cell object_cell " data-object_type="document
" data-object_id="98434007" data-track="trending" data-
track_uuid="++7ZCmJ95bvsYirl3wzB2Yie6uY=" data-reading_progress="
0"><a href="https://www.scribd.com/document/98434007/High-Roller"
class="doc_link "><div class="thumb object_cell_hover " sty
le=""><img data-src="https://imgv2-1-f.scribdassets.com/img/docum
ent/98434007/fit_to_size/144x192/c6af145970/1406112658" data-srcset="h
ttps://imgv2-1-f.scribdassets.com/img/document/98434007/fit_to_size/144x192/c6af
145970/1406112658 1x, https://imgv2-1-f.scribdassets.com/img/document/98434007/f
it_to_size/288x384/27f5ba3067/1406112658 2x" class="lazy_loading"
alt="document"><div class="shadow_overlay"></div><div class
="action_layer"><div class="main_action"><div class="re
ad_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_a
udiobook_play_large"></div></div><div class="overlay"></div></div
></div><div class="under_title_wrapper"><div class="under_title&q
uot;>High Roller</div></div></a></li><li class="document_cell object_cell
" data-object_type="document" data-object_id="139738270"
; data-track="trending" data-track_uuid="WjFU5cHOOS6nvaJ13WUB+b2L
oCQ=" data-reading_progress="0"><a href="https://www.scribd.
com/document/139738270/Cyber-Infrastructure-Protection-Vol-II" class="
doc_link "><div class="thumb object_cell_hover " style="&quo
t;><img data-src="https://imgv2-2-f.scribdassets.com/img/document/139738270
/fit_to_size/144x192/5ceb4b6197/1373744543" data-srcset="https://imgv2
-2-f.scribdassets.com/img/document/139738270/fit_to_size/144x192/5ceb4b6197/1373
744543 1x, https://imgv2-2-f.scribdassets.com/img/document/139738270/fit_to_size
/288x384/311227b14a/1373744543 2x" class="lazy_loading" alt="
;document"><div class="shadow_overlay"></div><div class="act
ion_layer"><div class="main_action"><div class="read_icon ic
on-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_p
lay_large"></div></div><div class="overlay"></div></div></div><di
v class="under_title_wrapper"><div class="under_title">Cyber
Infrastructure Protection</div></div></a></li><li class="document_cell obj
ect_cell " data-object_type="document" data-object_id="1931
05116" data-track="trending" data-track_uuid="nIuDgGfJOFQrep
iTSAD9wCVoNRU=" data-reading_progress="0"><a href="https://w
ww.scribd.com/document/193105116/DennisTechLabs-Anti-Virus-Report-2013-Q4-Kasper
sky-Norton-ESET-Best-Microsoft-McAfee-Worst" class="doc_link "><d
iv class="thumb object_cell_hover " style=""><img data-src=&
quot;https://imgv2-1-f.scribdassets.com/img/document/193105116/fit_to_size/144x1
92/664322e5b3/1412163568" data-srcset="https://imgv2-1-f.scribdassets.
com/img/document/193105116/fit_to_size/144x192/664322e5b3/1412163568 1x, https:/
/imgv2-2-f.scribdassets.com/img/document/193105116/fit_to_size/288x384/6fec497de
f/1412163568 2x" class="lazy_loading" alt="document"><d
iv class="shadow_overlay"></div><div class="action_layer"><d
iv class="main_action"><div class="read_icon icon-ic_tableofconte
nts"></div><div class="play_icon icon-ic_audiobook_play_large"></
div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"><div class="under_title">DennisTechLabs Anti-Vir
us Report 2013 Q4</div></div></a></li><li class="document_cell object_cell
" data-object_type="document" data-object_id="248505706&quo
t; data-track="trending" data-track_uuid="GiNfxhR8ZZy+cWS/VVp3pUH
q958=" data-reading_progress="0"><a href="https://www.scribd
.com/document/248505706/The-Regin-Platform-Nation-State-Ownage-of-GSM-Networks-K
aspersky-Report" class="doc_link "><div class="thumb object_
cell_hover " style=""><img data-src="https://imgv2-1-f.scrib
dassets.com/img/document/248505706/fit_to_size/144x192/052efe7101/1422693202&quo
t; data-srcset="https://imgv2-1-f.scribdassets.com/img/document/248505706/f
it_to_size/144x192/052efe7101/1422693202 1x, https://imgv2-1-f.scribdassets.com/
img/document/248505706/fit_to_size/288x384/c90c6da2b9/1422693202 2x" class=
"lazy_loading" alt="document"><div class="shadow_overla
y"></div><div class="action_layer"><div class="main_action&q
uot;><div class="read_icon icon-ic_tableofcontents"></div><div class=&
quot;play_icon icon-ic_audiobook_play_large"></div></div><div class="o
verlay"></div></div></div><div class="under_title_wrapper"><div c
lass="under_title">The Regin Platform</div></div></a></li><li class=&q
uot;document_cell object_cell " data-object_type="document" data
-object_id="270009345" data-track="trending" data-track_uuid
="0sRi8NxbrjJ2joj68fdJx5Al6qY=" data-reading_progress="0"><a
href="https://www.scribd.com/document/270009345/FTC-Currency-Scam-Complain
t" class="doc_link "><div class="thumb object_cell_hover &qu
ot; style=""><img data-src="https://imgv2-1-f.scribdassets.com/im
g/document/270009345/fit_to_size/144x192/e40dbf5bed/1435819008" data-srcset
="https://imgv2-1-f.scribdassets.com/img/document/270009345/fit_to_size/144
x192/e40dbf5bed/1435819008 1x, https://imgv2-2-f.scribdassets.com/img/document/2
70009345/fit_to_size/288x384/beec2c9dc1/1435819008 2x" class="lazy_loa
ding" alt="document"><div class="shadow_overlay"></div>
<div class="action_layer"><div class="main_action"><div clas
s="read_icon icon-ic_tableofcontents"></div><div class="play_icon
icon-ic_audiobook_play_large"></div></div><div class="overlay"><
/div></div></div><div class="under_title_wrapper"><div class="und
er_title">FTC Currency Scam Complaint</div></div></a></li><li class="d
ocument_cell object_cell " data-object_type="document" data-obje
ct_id="315070278" data-track="trending" data-track_uuid=&quo
t;VPfqHQDccpL274/vhU/QSmdL8h0=" data-reading_progress="0"><a href
="https://www.scribd.com/document/315070278/tmp44B8-tmp" class="d
oc_link "><div class="thumb object_cell_hover " style=""
;><img data-src="https://imgv2-1-f.scribdassets.com/img/document/315070278/
fit_to_size/144x192/9b3cd0a9e7/1465314387" data-srcset="https://imgv2-
1-f.scribdassets.com/img/document/315070278/fit_to_size/144x192/9b3cd0a9e7/14653
14387 1x, https://imgv2-2-f.scribdassets.com/img/document/315070278/fit_to_size/
288x384/d289db48a0/1465314387 2x" class="lazy_loading" alt="
document"><div class="shadow_overlay"></div><div class="acti
on_layer"><div class="main_action"><div class="read_icon ico
n-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_pl
ay_large"></div></div><div class="overlay"></div></div></div><div
class="under_title_wrapper"><div class="under_title">tmp44B
8.tmp</div></div></a></li><li class="document_cell object_cell " data
-object_type="document" data-object_id="339404108" data-trac
k="trending" data-track_uuid="r98/IYbdlmeD2reI55zqQzreWdc="
data-reading_progress="0"><a href="https://www.scribd.com/documen
t/339404108/Stein-Amended-Complaint" class="doc_link "><div class
="thumb object_cell_hover " style=""><img data-src="htt
ps://imgv2-2-f.scribdassets.com/img/document/339404108/fit_to_size/144x192/98441
6b7a5/1487175975" data-srcset="https://imgv2-2-f.scribdassets.com/img/
document/339404108/fit_to_size/144x192/984416b7a5/1487175975 1x, https://imgv2-1
-f.scribdassets.com/img/document/339404108/fit_to_size/288x384/284aefcf8c/148717
5975 2x" class="lazy_loading" alt="document"><div class
="shadow_overlay"></div><div class="action_layer"><div class
="main_action"><div class="read_icon icon-ic_tableofcontents"
;></div><div class="play_icon icon-ic_audiobook_play_large"></div></di
v><div class="overlay"></div></div></div><div class="under_title_
wrapper"><div class="under_title">Stein Amended Complaint</div></
div></a></li><li class="document_cell object_cell " data-object_type=
"document" data-object_id="56571913" data-track="trendi
ng" data-track_uuid="bAizVkelIpXf+vy3eq0jkqbZpp0=" data-reading_p
rogress="0"><a href="https://www.scribd.com/document/56571913/Go-
Lackawanna-05-29-2011" class="doc_link "><div class="thumb o
bject_cell_hover " style=""><img data-src="https://imgv2-2-f
.scribdassets.com/img/document/56571913/fit_to_size/144x192/0d0f93c922/135983446
0" data-srcset="https://imgv2-2-f.scribdassets.com/img/document/565719
13/fit_to_size/144x192/0d0f93c922/1359834460 1x, https://imgv2-1-f.scribdassets.
com/img/document/56571913/fit_to_size/288x384/178083b9a2/1359834460 2x" cla
ss="lazy_loading" alt="document"><div class="shadow_ove
rlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div clas
s="play_icon icon-ic_audiobook_play_large"></div></div><div class=&quo
t;overlay"></div></div></div><div class="under_title_wrapper"><di
v class="under_title">Go Lackawanna 05-29-2011</div></div></a></li><li
class="document_cell object_cell " data-object_type="document&q
uot; data-object_id="72931617" data-track="trending" data-tr
ack_uuid="aYy4hGBwfE9RZiXBYIFOazevVWw=" data-reading_progress="0&
quot;><a href="https://www.scribd.com/document/72931617/Excerpt-Worm-The-Fi
rst-Digital-World-War-by-Mark-Bowden" class="doc_link "><div clas
s="thumb object_cell_hover " style=""><img data-src="ht
tps://imgv2-2-f.scribdassets.com/img/document/72931617/fit_to_size/144x192/1c72f
963bf/1321466145" data-srcset="https://imgv2-2-f.scribdassets.com/img/
document/72931617/fit_to_size/144x192/1c72f963bf/1321466145 1x, https://imgv2-1-
f.scribdassets.com/img/document/72931617/fit_to_size/288x384/7563e1bafe/13214661
45 2x" class="lazy_loading" alt="document"><div class=&
quot;shadow_overlay"></div><div class="action_layer"><div class=&
quot;main_action"><div class="read_icon icon-ic_tableofcontents">
</div><div class="play_icon icon-ic_audiobook_play_large"></div></div>
<div class="overlay"></div></div></div><div class="under_title_wr
apper"><div class="under_title">Excerpt</div></div></a></li><li c
lass="document_cell object_cell " data-object_type="document&quo
t; data-object_id="78075012" data-track="trending" data-trac
k_uuid="CMTQxuYD2hWHYlKaKvuzbvwHcZA=" data-reading_progress="0&qu
ot;><a href="https://www.scribd.com/document/78075012/Visualizing-Compiled-
Executables-for-Malware-Analysis" class="doc_link "><div class=&q
uot;thumb object_cell_hover " style=""><img data-src="https:
//imgv2-1-f.scribdassets.com/img/document/78075012/fit_to_size/144x192/39ebac4a7
5/1433883292" data-srcset="https://imgv2-1-f.scribdassets.com/img/docu
ment/78075012/fit_to_size/144x192/39ebac4a75/1433883292 1x, https://imgv2-1-f.sc
ribdassets.com/img/document/78075012/fit_to_size/288x384/0fb20364d7/1433883292 2
x" class="lazy_loading" alt="document"><div class="
;shadow_overlay"></div><div class="action_layer"><div class="
;main_action"><div class="read_icon icon-ic_tableofcontents"></di
v><div class="play_icon icon-ic_audiobook_play_large"></div></div><div
class="overlay"></div></div></div><div class="under_title_wrappe
r"><div class="under_title">Visualizing Compiled Executables for
Malware Analysis</div></div></a></li><li class="document_cell object_cell
" data-object_type="document" data-object_id="179908610"
; data-track="trending" data-track_uuid="VNsZsKpHQQNWnnqJTSLnypI2
bD0=" data-reading_progress="0"><a href="https://www.scribd.
com/document/179908610/NQ-Responds-To-Muddy-Waters-pdf" class="doc_lin
k "><div class="thumb object_cell_hover " style=""><img
data-src="https://imgv2-1-f.scribdassets.com/img/document/179908610/fit_to
_size/144x192/f72411df76/1413259105" data-srcset="https://imgv2-1-f.sc
ribdassets.com/img/document/179908610/fit_to_size/144x192/f72411df76/1413259105
1x, https://imgv2-2-f.scribdassets.com/img/document/179908610/fit_to_size/288x38
4/59b9c0040e/1413259105 2x" class="lazy_loading" alt="docume
nt"><div class="shadow_overlay"></div><div class="action_lay
er"><div class="main_action"><div class="read_icon icon-ic_t
ableofcontents"></div><div class="play_icon icon-ic_audiobook_play_lar
ge"></div></div><div class="overlay"></div></div></div><div class
="under_title_wrapper"><div class="under_title">NQ Responds
To Muddy Waters.pdf</div></div></a></li><li class="document_cell object_cel
l " data-object_type="document" data-object_id="191911540&q
uot; data-track="trending" data-track_uuid="Dmv6PbQCYE1lPntD33TJO
StZG50=" data-reading_progress="0"><a href="https://www.scri
bd.com/document/191911540/Finjan-v-Proofpoint-et-al" class="doc_link &
quot;><div class="thumb object_cell_hover " style=""><img da
ta-src="https://imgv2-2-f.scribdassets.com/img/document/191911540/fit_to_si
ze/144x192/902efb249d/1394418218" data-srcset="https://imgv2-2-f.scrib
dassets.com/img/document/191911540/fit_to_size/144x192/902efb249d/1394418218 1x,
https://imgv2-1-f.scribdassets.com/img/document/191911540/fit_to_size/288x384/e
3593f82b7/1394418218 2x" class="lazy_loading" alt="document&
quot;><div class="shadow_overlay"></div><div class="action_layer&
quot;><div class="main_action"><div class="read_icon icon-ic_tabl
eofcontents"></div><div class="play_icon icon-ic_audiobook_play_large&
quot;></div></div><div class="overlay"></div></div></div><div class=&q
uot;under_title_wrapper"><div class="under_title">Finjan v. Proof
point et. al.</div></div></a></li><li class="document_cell object_cell &qu
ot; data-object_type="document" data-object_id="204556894" d
ata-track="trending" data-track_uuid="9mGjjBuCKh9FoBUSq8TSqmqYLbM
=" data-reading_progress="0"><a href="https://www.scribd.com
/document/204556894/FBI-Seeking-to-Purchase-35GB-of-Malware-Per-Day" class=
"doc_link "><div class="thumb object_cell_hover " style=&quo
t;"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/204
556894/fit_to_size/144x192/644db9204b/1423066290" data-srcset="https:/
/imgv2-1-f.scribdassets.com/img/document/204556894/fit_to_size/144x192/644db9204
b/1423066290 1x, https://imgv2-1-f.scribdassets.com/img/document/204556894/fit_t
o_size/288x384/e32e75ae2d/1423066290 2x" class="lazy_loading" alt
="document"><div class="shadow_overlay"></div><div class=&qu
ot;action_layer"><div class="main_action"><div class="read_i
con icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audio
book_play_large"></div></div><div class="overlay"></div></div></d
iv><div class="under_title_wrapper"><div class="under_title"
>FBI Seeking to Purchase 35GB of Malware Per Day</div></div></a></li></ul></div>
</div><div><img src="https://s2-f.scribdassets.com/images/home/logged_in/ic
_home_control_left_arrow.png?1494885498" alt="carousel previous"
class="paddle page_left carousel_prev" data-track="carousel:previ
ous" aria-hidden="true"><img src="https://s1-f.scribdassets.
com/images/home/logged_in/ic_home_control_right_arrow.png?1494885498" alt=&
quot;carousel next" class="paddle page_right carousel_next" data-
track="carousel:next" aria-hidden="true"></div></div><div cl
ass="carousel_scrollbar"><div class="carousel_scrollbar_thumb&quo
t;></div></div></div></div><script type="text/javascript">
//<![CDATA[
new Scribd.UI.Carousel("#autogen_id_503789742", {"page"
;:false,"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=",&quo
t;module_id":"DptMFYFLDvkwurl9Bk6M50UHswg=","widget_name&quo
t;:"document_carousel:footer","sub_module":false})
//]]>
</script><div class="autogen_class_views_discover_modules_carousel document
_carousel module_row autogen_class_views_shared_carousels_carousel autogen_class
_widgets_base has_paddles has_document_cells carousel_widget show_title document
_carousel regular_doc_thumb_width" id="autogen_id_503795426" data
-lazy_images="true"><div class="carousel_wrap"><h3 class=&qu
ot;carousel_title" data-track="trending"><a class="title_lin
k" href="https://www.scribd.com/interest/Computer-Security/docs"
data-track data-track_rats="mc" data-track_uuid="eabG2pQt6DwIXCMs
d6CQ3DOfnEg=">Documents About Computer Security</a></h3><a href="#skip
_carousel" class="carousel_skip_link">Skip carousel</a><div class
="carousel_outer"><div class="carousel"><div class="car
ousel_scrolling"><ul class="autogen_class_views_shared_carousels_docum
ent_cells autogen_class_widgets_base" id="autogen_id_503794065"><
li class="document_cell object_cell " data-object_type="document
" data-object_id="333290070" data-track="trending" data
-track_uuid="/AuF2+1gNYqqAoG3PKuJokTYxKM=" data-reading_progress="
;0"><a href="https://www.scribd.com/document/333290070/FCC-Response-12
-05-2016" class="doc_link "><div class="thumb object_cell_ho
ver " style=""><img data-src="https://imgv2-1-f.scribdassets
.com/img/document/333290070/fit_to_size/144x192/69d637aa4c/1481169383" data
-srcset="https://imgv2-1-f.scribdassets.com/img/document/333290070/fit_to_s
ize/144x192/69d637aa4c/1481169383 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/333290070/fit_to_size/288x384/a0455f902e/1481169383 2x" class="l
azy_loading" alt="document"><div class="shadow_overlay"
></div><div class="action_layer"><div class="main_action"><d
iv class="read_icon icon-ic_tableofcontents"></div><div class="pl
ay_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&
quot;></div></div></div><div class="under_title_wrapper"><div class=&q
uot;under_title">FCC Response 12-05-2016</div></div></a></li><li class=&quo
t;document_cell object_cell " data-object_type="document" data-o
bject_id="290177134" data-track="trending" data-track_uuid=&
quot;5FUQRU4PLaLojxyY+FeR8vTlKIs=" data-reading_progress="0"><a h
ref="https://www.scribd.com/doc/290177134/IS-Encryption-Guide" class=&
quot;doc_link "><div class="thumb object_cell_hover " style="
;"><img data-src="https://imgv2-2-f.scribdassets.com/img/document/2901
77134/fit_to_size/144x192/5a7990f2be/1451534045" data-srcset="https://
imgv2-2-f.scribdassets.com/img/document/290177134/fit_to_size/144x192/5a7990f2be
/1451534045 1x, https://imgv2-2-f.scribdassets.com/img/document/290177134/fit_to
_size/288x384/07ddeafa46/1451534045 2x" class="lazy_loading" alt=
"document"><div class="shadow_overlay"></div><div class=&quo
t;action_layer"><div class="main_action"><div class="read_ic
on icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiob
ook_play_large"></div></div><div class="overlay"></div></div></di
v><div class="under_title_wrapper"><div class="under_title">
IS Encryption Guide</div></div></a></li><li class="document_cell object_cel
l " data-object_type="document" data-object_id="28994827&qu
ot; data-track="trending" data-track_uuid="VphbWCLYJtRhssc8f/WydX
m8Oo8=" data-reading_progress="0"><a href="https://www.scrib
d.com/document/28994827/USA-TODAY-Collegiate-Case-Study-Cybercrime" class=&
quot;doc_link "><div class="thumb object_cell_hover " style="
;"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/2899
4827/fit_to_size/144x192/1ae91f7cbd/1358918063" data-srcset="https://i
mgv2-1-f.scribdassets.com/img/document/28994827/fit_to_size/144x192/1ae91f7cbd/1
358918063 1x, https://imgv2-2-f.scribdassets.com/img/document/28994827/fit_to_si
ze/288x384/47d58082b8/1358918063 2x" class="lazy_loading" alt=&qu
ot;document"><div class="shadow_overlay"></div><div class="a
ction_layer"><div class="main_action"><div class="read_icon
icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><
div class="under_title_wrapper"><div class="under_title">USA
TODAY Collegiate Case Study</div></div></a></li><li class="document_cell o
bject_cell " data-object_type="document" data-object_id="25
9315223" data-track="trending" data-track_uuid="xswV2NHjeSUZ
i9bAlzPG0NaVFSQ=" data-reading_progress="0"><a href="https:/
/www.scribd.com/document/259315223/CISA-bill-text-with-OTI-redlines" class=
"doc_link "><div class="thumb object_cell_hover " style=&quo
t;"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/259
315223/fit_to_size/144x192/4b20e4ecf1/1429782142" data-srcset="https:/
/imgv2-1-f.scribdassets.com/img/document/259315223/fit_to_size/144x192/4b20e4ecf
1/1429782142 1x, https://imgv2-1-f.scribdassets.com/img/document/259315223/fit_t
o_size/288x384/2fae31d874/1429782142 2x" class="lazy_loading" alt
="document"><div class="shadow_overlay"></div><div class=&qu
ot;action_layer"><div class="main_action"><div class="read_i
con icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audio
book_play_large"></div></div><div class="overlay"></div></div></d
iv><div class="under_title_wrapper"><div class="under_title"
>CISA bill text with OTI redlines</div></div></a></li><li class="document_c
ell object_cell " data-object_type="document" data-object_id=&qu
ot;91268009" data-track="trending" data-track_uuid="800SnXdh
8e/PAvC/Nm6fIX13yow=" data-reading_progress="0"><a href="htt
ps://www.scribd.com/document/91268009/White-House-issues-statement-against-CISPA
" class="doc_link "><div class="thumb object_cell_hover &quo
t; style=""><img data-src="https://imgv2-1-f.scribdassets.com/img
/document/91268009/fit_to_size/144x192/270eab7761/1335384747" data-srcset=&
quot;https://imgv2-1-f.scribdassets.com/img/document/91268009/fit_to_size/144x19
2/270eab7761/1335384747 1x, https://imgv2-1-f.scribdassets.com/img/document/9126
8009/fit_to_size/288x384/94d819b13a/1335384747 2x" class="lazy_loading
" alt="document"><div class="shadow_overlay"></div><div
class="action_layer"><div class="main_action"><div class=&q
uot;read_icon icon-ic_tableofcontents"></div><div class="play_icon ico
n-ic_audiobook_play_large"></div></div><div class="overlay"></div
></div></div><div class="under_title_wrapper"><div class="under_t
itle">White House issues statement against CISPA</div></div></a></li><li cl
ass="document_cell object_cell " data-object_type="document"
; data-object_id="186380907" data-track="trending" data-trac
k_uuid="2lZ/tevHrvYnk+srSM3OmkkYcKM=" data-reading_progress="0&qu
ot;><a href="https://www.scribd.com/document/186380907/BILLS-113s1353is&quo
t; class="doc_link "><div class="thumb object_cell_hover " s
tyle=""><img data-src="https://imgv2-2-f.scribdassets.com/img/doc
ument/186380907/fit_to_size/144x192/25e0951eb1/1390663030" data-srcset=&quo
t;https://imgv2-2-f.scribdassets.com/img/document/186380907/fit_to_size/144x192/
25e0951eb1/1390663030 1x, https://imgv2-1-f.scribdassets.com/img/document/186380
907/fit_to_size/288x384/81cdbd0c87/1390663030 2x" class="lazy_loading&
quot; alt="document"><div class="shadow_overlay"></div><div
class="action_layer"><div class="main_action"><div class=&qu
ot;read_icon icon-ic_tableofcontents"></div><div class="play_icon icon
-ic_audiobook_play_large"></div></div><div class="overlay"></div>
</div></div><div class="under_title_wrapper"><div class="under_ti
tle">BILLS-113s1353is</div></div></a></li><li class="document_cell obj
ect_cell " data-object_type="document" data-object_id="3335
36875" data-track="trending" data-track_uuid="paLySnFzTBqBDg
rNPXxpfoL2GbA=" data-reading_progress="0"><a href="https://w
ww.scribd.com/document/333536875/2017-Global-State-of-Information-Security-Surve
y" class="doc_link "><div class="thumb object_cell_hover &qu
ot; style=""><img data-src="https://imgv2-2-f.scribdassets.com/im
g/document/333536875/fit_to_size/144x192/b16627d7eb/1481131244" data-srcset
="https://imgv2-2-f.scribdassets.com/img/document/333536875/fit_to_size/144
x192/b16627d7eb/1481131244 1x, https://imgv2-1-f.scribdassets.com/img/document/3
33536875/fit_to_size/288x384/a272283c31/1481131244 2x" class="lazy_loa
ding" alt="document"><div class="shadow_overlay"></div>
<div class="action_layer"><div class="main_action"><div clas
s="read_icon icon-ic_tableofcontents"></div><div class="play_icon
icon-ic_audiobook_play_large"></div></div><div class="overlay"><
/div></div></div><div class="under_title_wrapper"><div class="und
er_title">2017 Global State of Information Security Survey</div></div></a><
/li><li class="document_cell object_cell " data-object_type="doc
ument" data-object_id="286056862" data-track="trending"
data-track_uuid="YiVgxrPZNA6F/FoJuNQqtgfQk2s=" data-reading_progress=
"0"><a href="https://www.scribd.com/document/286056862/2016-Globa
l-State-of-Information-Security-Survey-Sample-Slides" class="doc_link
"><div class="thumb object_cell_hover " style=""><img d
ata-src="https://imgv2-2-f.scribdassets.com/img/document/286056862/fit_to_s
ize/144x192/06a569ce69/1465847419" data-srcset="https://imgv2-2-f.scri
bdassets.com/img/document/286056862/fit_to_size/144x192/06a569ce69/1465847419 1x
, https://imgv2-2-f.scribdassets.com/img/document/286056862/fit_to_size/288x384/
6edda37d1a/1465847419 2x" class="lazy_loading" alt="document
"><div class="shadow_overlay"></div><div class="action_layer
"><div class="main_action"><div class="read_icon icon-ic_tab
leofcontents"></div><div class="play_icon icon-ic_audiobook_play_large
"></div></div><div class="overlay"></div></div></div><div class=&
quot;under_title_wrapper"><div class="under_title">2016 Global St
ate of Information Security Survey Sample Slides</div></div></a></li><li class=&
quot;document_cell object_cell " data-object_type="document" dat
a-object_id="337089962" data-track="trending" data-track_uui
d="M7QXvP5lCh6pSz8WxnIGAy2F9zY=" data-reading_progress="0"><
a href="https://www.scribd.com/document/337089962/WP2016-3-1-4-Blockchain-S
ecurity" class="doc_link "><div class="thumb object_cell_hov
er " style=""><img data-src="https://imgv2-2-f.scribdassets.
com/img/document/337089962/fit_to_size/144x192/31648c7657/1489563998" data-
srcset="https://imgv2-2-f.scribdassets.com/img/document/337089962/fit_to_si
ze/144x192/31648c7657/1489563998 1x, https://imgv2-1-f.scribdassets.com/img/docu
ment/337089962/fit_to_size/288x384/00e386527f/1489563998 2x" class="la
zy_loading" alt="document"><div class="shadow_overlay">
</div><div class="action_layer"><div class="main_action"><di
v class="read_icon icon-ic_tableofcontents"></div><div class="pla
y_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&q
uot;></div></div></div><div class="under_title_wrapper"><div class=&qu
ot;under_title">WP2016 3-1 4 Blockchain Security</div></div></a></li><li cl
ass="document_cell object_cell " data-object_type="document"
; data-object_id="256961616" data-track="trending" data-trac
k_uuid="PUNlLHujYlxkF180ZtyntBGLxGw=" data-reading_progress="0&qu
ot;><a href="https://www.scribd.com/document/256961616/CSE-Response-to-CBC-
Re-PONY-EXPRESS" class="doc_link "><div class="thumb object_
cell_hover " style=""><img data-src="https://imgv2-1-f.scrib
dassets.com/img/document/256961616/fit_to_size/144x192/0852386abc/1425673476&quo
t; data-srcset="https://imgv2-1-f.scribdassets.com/img/document/256961616/f
it_to_size/144x192/0852386abc/1425673476 1x, https://imgv2-1-f.scribdassets.com/
img/document/256961616/fit_to_size/288x384/96a99ae88e/1425673476 2x" class=
"lazy_loading" alt="document"><div class="shadow_overla
y"></div><div class="action_layer"><div class="main_action&q
uot;><div class="read_icon icon-ic_tableofcontents"></div><div class=&
quot;play_icon icon-ic_audiobook_play_large"></div></div><div class="o
verlay"></div></div></div><div class="under_title_wrapper"><div c
lass="under_title">CSE Response to CBC Re</div></div></a></li><li clas
s="document_cell object_cell " data-object_type="document"
data-object_id="332578388" data-track="trending" data-track_
uuid="ZyFIOsXwoy6+i5IHys+daR47Aa4=" data-reading_progress="0"
;><a href="https://www.scribd.com/document/332578388/China-Encryption-Polic
y-and-International-Influence" class="doc_link "><div class="
;thumb object_cell_hover " style=""><img data-src="https://i
mgv2-1-f.scribdassets.com/img/document/332578388/fit_to_size/144x192/259bb04219/
1481575399" data-srcset="https://imgv2-1-f.scribdassets.com/img/docume
nt/332578388/fit_to_size/144x192/259bb04219/1481575399 1x, https://imgv2-2-f.scr
ibdassets.com/img/document/332578388/fit_to_size/288x384/9eb5cf47ac/1481575399 2
x" class="lazy_loading" alt="document"><div class="
;shadow_overlay"></div><div class="action_layer"><div class="
;main_action"><div class="read_icon icon-ic_tableofcontents"></di
v><div class="play_icon icon-ic_audiobook_play_large"></div></div><div
class="overlay"></div></div></div><div class="under_title_wrappe
r"><div class="under_title">China, Encryption Policy, and Interna
tional Influence</div></div></a></li><li class="document_cell object_cell
" data-object_type="document" data-object_id="321669470"
; data-track="trending" data-track_uuid="ca2oaUWxE03OF0fKeW9h7N4w
hDo=" data-reading_progress="0"><a href="https://www.scribd.
com/document/321669470/HOUSE-HEARING-113TH-CONGRESS-PROTECTING-YOUR-PERSONAL-DAT
A-HOW-LAW-ENFORCEMENT-WORKS-WITH-THE-PRIVATE-SECTOR-TO-PREVENT-CYBERCRIME"
class="doc_link "><div class="thumb object_cell_hover " styl
e=""><img data-src="https://imgv2-1-f.scribdassets.com/img/docume
nt/321669470/fit_to_size/144x192/4540ab46d8/1471608099" data-srcset="h
ttps://imgv2-1-f.scribdassets.com/img/document/321669470/fit_to_size/144x192/454
0ab46d8/1471608099 1x, https://imgv2-1-f.scribdassets.com/img/document/321669470
/fit_to_size/288x384/d6804491b5/1471608099 2x" class="lazy_loading&quo
t; alt="document"><div class="shadow_overlay"></div><div cla
ss="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic
_audiobook_play_large"></div></div><div class="overlay"></div></d
iv></div><div class="under_title_wrapper"><div class="under_title
">HOUSE HEARING, 113TH CONGRESS - PROTECTING YOUR PERSONAL DATA</div></div>
</a></li><li class="document_cell object_cell " data-object_type=&quo
t;document" data-object_id="328759298" data-track="trending&
quot; data-track_uuid="CAog0E8OGUdBzTkoGGaAIPNeT4U=" data-reading_prog
ress="0"><a href="https://www.scribd.com/document/328759298/NHTSA
-Cybersecurity-Best-Practices-for-Modern-Vehicles" class="doc_link &qu
ot;><div class="thumb object_cell_hover " style=""><img data
-src="https://imgv2-2-f.scribdassets.com/img/document/328759298/fit_to_size
/144x192/73533d5d07/1492276630" data-srcset="https://imgv2-2-f.scribda
ssets.com/img/document/328759298/fit_to_size/144x192/73533d5d07/1492276630 1x, h
ttps://imgv2-2-f.scribdassets.com/img/document/328759298/fit_to_size/288x384/88c
2aece68/1492276630 2x" class="lazy_loading" alt="document&qu
ot;><div class="shadow_overlay"></div><div class="action_layer&qu
ot;><div class="main_action"><div class="read_icon icon-ic_tableo
fcontents"></div><div class="play_icon icon-ic_audiobook_play_large&qu
ot;></div></div><div class="overlay"></div></div></div><div class=&quo
t;under_title_wrapper"><div class="under_title">NHTSA Cybersecuri
ty Best Practices for Modern Vehicles</div></div></a></li><li class="docume
nt_cell object_cell " data-object_type="document" data-object_id
="336627464" data-track="trending" data-track_uuid="T8X
qztK2aXondh7CeGxbjNv39M4=" data-reading_progress="0"><a href=&quo
t;https://www.scribd.com/document/336627464/A-Framework-for-FinTech-National-Eco
nomic-Council-January-2017-White-House" class="doc_link "><div cl
ass="thumb object_cell_hover " style=""><img data-src="
https://imgv2-1-f.scribdassets.com/img/document/336627464/fit_to_size/144x192/eb
813e3cb6/1492276107" data-srcset="https://imgv2-1-f.scribdassets.com/i
mg/document/336627464/fit_to_size/144x192/eb813e3cb6/1492276107 1x, https://imgv
2-2-f.scribdassets.com/img/document/336627464/fit_to_size/288x384/4da05109a6/149
2276107 2x" class="lazy_loading" alt="document"><div cl
ass="shadow_overlay"></div><div class="action_layer"><div cl
ass="main_action"><div class="read_icon icon-ic_tableofcontents&q
uot;></div><div class="play_icon icon-ic_audiobook_play_large"></div><
/div><div class="overlay"></div></div></div><div class="under_tit
le_wrapper"><div class="under_title">A Framework for FinTech Nati
onal Economic Council January 2017 White House</div></div></a></li><li class=&qu
ot;document_cell object_cell " data-object_type="document" data-
object_id="296097632" data-track="trending" data-track_uuid=
"+/hlW1r5VQChFZSbblenn1KVkTg=" data-reading_progress="0"><a
href="https://www.scribd.com/doc/296097632/The-Best-Security-Defense-A-Good
-Offense" class="doc_link "><div class="thumb object_cell_ho
ver " style=""><img data-src="https://imgv2-1-f.scribdassets
.com/img/document/296097632/fit_to_size/144x192/547e04a02b/1465935087" data
-srcset="https://imgv2-1-f.scribdassets.com/img/document/296097632/fit_to_s
ize/144x192/547e04a02b/1465935087 1x, https://imgv2-1-f.scribdassets.com/img/doc
ument/296097632/fit_to_size/288x384/1b497042c7/1465935087 2x" class="l
azy_loading" alt="document"><div class="shadow_overlay"
></div><div class="action_layer"><div class="main_action"><d
iv class="read_icon icon-ic_tableofcontents"></div><div class="pl
ay_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&
quot;></div></div></div><div class="under_title_wrapper"><div class=&q
uot;under_title">The Best Security Defense? A Good Offense</div></div></a><
/li><li class="document_cell object_cell " data-object_type="doc
ument" data-object_id="332714474" data-track="trending"
data-track_uuid="soL2RQ+D/EqOQnWnLaGPUFsiUTE=" data-reading_progress=
"0"><a href="https://www.scribd.com/document/332714474/WikiLeaks-
Response-v5" class="doc_link "><div class="thumb object_cell
_hover " style=""><img data-src="https://imgv2-2-f.scribdass
ets.com/img/document/332714474/fit_to_size/144x192/19bba6f3c8/1480732042" d
ata-srcset="https://imgv2-2-f.scribdassets.com/img/document/332714474/fit_t
o_size/144x192/19bba6f3c8/1480732042 1x, https://imgv2-1-f.scribdassets.com/img/
document/332714474/fit_to_size/288x384/70d9a9cea5/1480732042 2x" class=&quo
t;lazy_loading" alt="document"><div class="shadow_overlay&qu
ot;></div><div class="action_layer"><div class="main_action"
><div class="read_icon icon-ic_tableofcontents"></div><div class="
;play_icon icon-ic_audiobook_play_large"></div></div><div class="overl
ay"></div></div></div><div class="under_title_wrapper"><div class
="under_title">WikiLeaks Response v5</div></div></a></li><li class=&qu
ot;document_cell object_cell " data-object_type="document" data-
object_id="306290051" data-track="trending" data-track_uuid=
"Cqtk5dPvMFSCtBl0iEDdSzrK8iE=" data-reading_progress="0"><a
href="https://www.scribd.com/document/306290051/How-Our-Unhealthy-Cybersecu
rity-Infrastructure-is-Hurting-Biotechnology" class="doc_link "><
div class="thumb object_cell_hover " style=""><img data-src=
"https://imgv2-2-f.scribdassets.com/img/document/306290051/fit_to_size/144x
192/e9eb441ada/1459269219" data-srcset="https://imgv2-2-f.scribdassets
.com/img/document/306290051/fit_to_size/144x192/e9eb441ada/1459269219 1x, https:
//imgv2-2-f.scribdassets.com/img/document/306290051/fit_to_size/288x384/0f01319b
1c/1459269219 2x" class="lazy_loading" alt="document"><
div class="shadow_overlay"></div><div class="action_layer"><
div class="main_action"><div class="read_icon icon-ic_tableofcont
ents"></div><div class="play_icon icon-ic_audiobook_play_large"><
/div></div><div class="overlay"></div></div></div><div class="und
er_title_wrapper"><div class="under_title">How Our Unhealthy Cybe
rsecurity Infrastructure is Hurting Biotechnology</div></div></a></li><li class=
"document_cell object_cell " data-object_type="document" da
ta-object_id="257104389" data-track="trending" data-track_uu
id="KmIjHOBjqForluQayKRwj2b5yS0=" data-reading_progress="0">
<a href="https://www.scribd.com/document/257104389/IARPA-Cyber-Attack-Autom
ated-Unconventional-Sensor-Environment-CAUSE" class="doc_link "><
div class="thumb object_cell_hover " style=""><img data-src=
"https://imgv2-2-f.scribdassets.com/img/document/257104389/fit_to_size/144x
192/8d5f5ac0de/1425420240" data-srcset="https://imgv2-2-f.scribdassets
.com/img/document/257104389/fit_to_size/144x192/8d5f5ac0de/1425420240 1x, https:
//imgv2-1-f.scribdassets.com/img/document/257104389/fit_to_size/288x384/112d2a53
6b/1425420240 2x" class="lazy_loading" alt="document"><
div class="shadow_overlay"></div><div class="action_layer"><
div class="main_action"><div class="read_icon icon-ic_tableofcont
ents"></div><div class="play_icon icon-ic_audiobook_play_large"><
/div></div><div class="overlay"></div></div></div><div class="und
er_title_wrapper"><div class="under_title">IARPA Cyber-Attack Aut
omated Unconventional Sensor Environment (CAUSE)</div></div></a></li><li class=&
quot;document_cell object_cell " data-object_type="document" dat
a-object_id="266842667" data-track="trending" data-track_uui
d="TKFLSUNEczKky6SazJZb8SxFwEI=" data-reading_progress="0"><
a href="https://www.scribd.com/doc/266842667/NJ-Digital-Currency-Jobs-Creat
ion-Act" class="doc_link "><div class="thumb object_cell_hov
er " style=""><img data-src="https://imgv2-1-f.scribdassets.
com/img/document/266842667/fit_to_size/144x192/5db9c1773c/1452273720" data-
srcset="https://imgv2-1-f.scribdassets.com/img/document/266842667/fit_to_si
ze/144x192/5db9c1773c/1452273720 1x, https://imgv2-2-f.scribdassets.com/img/docu
ment/266842667/fit_to_size/288x384/2321fa311c/1452273720 2x" class="la
zy_loading" alt="document"><div class="shadow_overlay">
</div><div class="action_layer"><div class="main_action"><di
v class="read_icon icon-ic_tableofcontents"></div><div class="pla
y_icon icon-ic_audiobook_play_large"></div></div><div class="overlay&q
uot;></div></div></div><div class="under_title_wrapper"><div class=&qu
ot;under_title">NJ Digital Currency Jobs Creation Act</div></div></a></li><
li class="document_cell object_cell " data-object_type="document
" data-object_id="337105377" data-track="trending" data
-track_uuid="rgUjeBg32OaeHo1Qf0X61nJc+IQ=" data-reading_progress="
;0"><a href="https://www.scribd.com/document/337105377/FINRA-Blockchai
n-Report-2017-January" class="doc_link "><div class="thumb o
bject_cell_hover " style=""><img data-src="https://imgv2-2-f
.scribdassets.com/img/document/337105377/fit_to_size/144x192/72eddd4366/14849382
44" data-srcset="https://imgv2-2-f.scribdassets.com/img/document/33710
5377/fit_to_size/144x192/72eddd4366/1484938244 1x, https://imgv2-1-f.scribdasset
s.com/img/document/337105377/fit_to_size/288x384/4fbb3d0905/1484938244 2x"
class="lazy_loading" alt="document"><div class="shadow_
overlay"></div><div class="action_layer"><div class="main_ac
tion"><div class="read_icon icon-ic_tableofcontents"></div><div c
lass="play_icon icon-ic_audiobook_play_large"></div></div><div class=&
quot;overlay"></div></div></div><div class="under_title_wrapper">
<div class="under_title">FINRA Blockchain Report 2017 January</div></d
iv></a></li><li class="document_cell object_cell " data-object_type=&
quot;document" data-object_id="298833616" data-track="trendi
ng" data-track_uuid="BpeumH/1CK/cSP/+47A1opzBh2M=" data-reading_p
rogress="0"><a href="https://www.scribd.com/document/298833616/Th
e-importance-of-Big-Data-analytics-in-the-field-of-Cyber-Security" class=&q
uot;doc_link "><div class="thumb object_cell_hover " style="
"><img data-src="https://imgv2-2-f.scribdassets.com/img/document/29883
3616/fit_to_size/144x192/11907dca29/1455093231" data-srcset="https://i
mgv2-2-f.scribdassets.com/img/document/298833616/fit_to_size/144x192/11907dca29/
1455093231 1x, https://imgv2-2-f.scribdassets.com/img/document/298833616/fit_to_
size/288x384/71d5175897/1455093231 2x" class="lazy_loading" alt=&
quot;document"><div class="shadow_overlay"></div><div class="
;action_layer"><div class="main_action"><div class="read_ico
n icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobo
ok_play_large"></div></div><div class="overlay"></div></div></div
><div class="under_title_wrapper"><div class="under_title">T
he importance of Big Data analytics in the field of Cyber Security</div></div></
a></li><li class="document_cell object_cell " data-object_type="
document" data-object_id="310936704" data-track="trending&qu
ot; data-track_uuid="hFV9Po+5NDZWXAZFbd7PO2YR/40=" data-reading_progre
ss="0"><a href="https://www.scribd.com/document/310936704/U-S-Chi
na-Cybersecurity-Cooperation-Needs-to-Move-More-Rapidly" class="doc_li
nk "><div class="thumb object_cell_hover " style=""><im
g data-src="https://imgv2-2-f.scribdassets.com/img/document/310936704/fit_t
o_size/144x192/73032ac751/1461946188" data-srcset="https://imgv2-2-f.s
cribdassets.com/img/document/310936704/fit_to_size/144x192/73032ac751/1461946188
1x, https://imgv2-1-f.scribdassets.com/img/document/310936704/fit_to_size/288x3
84/b8895f923c/1461946188 2x" class="lazy_loading" alt="docum
ent"><div class="shadow_overlay"></div><div class="action_la
yer"><div class="main_action"><div class="read_icon icon-ic_
tableofcontents"></div><div class="play_icon icon-ic_audiobook_play_la
rge"></div></div><div class="overlay"></div></div></div><div clas
s="under_title_wrapper"><div class="under_title">U.S.-China
Cybersecurity Cooperation Needs to Move More Rapidly</div></div></a></li><li cla
ss="document_cell object_cell " data-object_type="document"
data-object_id="316482163" data-track="trending" data-track
_uuid="R05fE2AQjYKszC4J8eoo7f5iXYg=" data-reading_progress="0&quo
t;><a href="https://www.scribd.com/doc/316482163/Hacking-Back-Without-Crack
ing-Up-by-Jeremy-Rabkin-and-Ariel-Rabkin" class="doc_link "><div
class="thumb object_cell_hover " style=""><img data-src=&quo
t;https://imgv2-1-f.scribdassets.com/img/document/316482163/fit_to_size/144x192/
698d4e4163/1479245863" data-srcset="https://imgv2-1-f.scribdassets.com
/img/document/316482163/fit_to_size/144x192/698d4e4163/1479245863 1x, https://im
gv2-2-f.scribdassets.com/img/document/316482163/fit_to_size/288x384/28b50d44b1/1
479245863 2x" class="lazy_loading" alt="document"><div
class="shadow_overlay"></div><div class="action_layer"><div
class="main_action"><div class="read_icon icon-ic_tableofcontents
"></div><div class="play_icon icon-ic_audiobook_play_large"></div
></div><div class="overlay"></div></div></div><div class="under_t
itle_wrapper"><div class="under_title">Hacking Back Without Crack
ing Up, by Jeremy Rabkin and Ariel Rabkin</div></div></a></li><li class="do
cument_cell object_cell " data-object_type="document" data-objec
t_id="322903766" data-track="trending" data-track_uuid="
;oz+H8AUp3tf6YGj9KezBMtQ5jB0=" data-reading_progress="0"><a href=
"https://www.scribd.com/document/322903766/SENATE-HEARING-113TH-CONGRESS-TH
E-CYBERSECURITY-PARTNERSHIP-BETWEEN-THE-PRIVATE-SECTOR-AND-OUR-GOVERNMENT-PROTEC
TING-OUR-NATIONAL-AND-ECONOMIC-SEC" class="doc_link "><div class=
"thumb object_cell_hover " style=""><img data-src="http
s://imgv2-2-f.scribdassets.com/img/document/322903766/fit_to_size/144x192/6a4405
a09f/1474334130" data-srcset="https://imgv2-2-f.scribdassets.com/img/d
ocument/322903766/fit_to_size/144x192/6a4405a09f/1474334130 1x, https://imgv2-2-
f.scribdassets.com/img/document/322903766/fit_to_size/288x384/71d327a134/1474334
130 2x" class="lazy_loading" alt="document"><div class=
"shadow_overlay"></div><div class="action_layer"><div class=
"main_action"><div class="read_icon icon-ic_tableofcontents"
></div><div class="play_icon icon-ic_audiobook_play_large"></div></div
><div class="overlay"></div></div></div><div class="under_title_w
rapper"><div class="under_title">SENATE HEARING, 113TH CONGRESS -
THE CYBERSECURITY PARTNERSHIP BETWEEN THE PRIVATE SECTOR AND OUR GOVERNMENT</di
v></div></a></li><li class="document_cell object_cell " data-object_t
ype="document" data-object_id="336965171" data-track="t
rending" data-track_uuid="2EJDzy2UnyIiWwnQeklFHI1KHSY=" data-read
ing_progress="0"><a href="https://www.scribd.com/document/3369651
71/Mozilla-IHR-v01" class="doc_link "><div class="thumb obje
ct_cell_hover " style=""><img data-src="https://imgv2-2-f.sc
ribdassets.com/img/document/336965171/fit_to_size/144x192/cc67de39b3/1485295625&
quot; data-srcset="https://imgv2-2-f.scribdassets.com/img/document/33696517
1/fit_to_size/144x192/cc67de39b3/1485295625 1x, https://imgv2-2-f.scribdassets.c
om/img/document/336965171/fit_to_size/288x384/91b21f42ac/1485295625 2x" cla
ss="lazy_loading" alt="document"><div class="shadow_ove
rlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div clas
s="play_icon icon-ic_audiobook_play_large"></div></div><div class=&quo
t;overlay"></div></div></div><div class="under_title_wrapper"><di
v class="under_title">Mozilla IHR v01</div></div></a></li><li class=&q
uot;document_cell object_cell " data-object_type="document" data
-object_id="337566927" data-track="trending" data-track_uuid
="apQ36BWlYb4+RzzbitsXtoQvFhY=" data-reading_progress="0"><a
href="https://www.scribd.com/document/337566927/Letter-From-Jeh-Johnson&qu
ot; class="doc_link "><div class="thumb object_cell_hover "
style=""><img data-src="https://imgv2-1-f.scribdassets.com/img/do
cument/337566927/fit_to_size/144x192/39d52977da/1485386667" data-srcset=&qu
ot;https://imgv2-1-f.scribdassets.com/img/document/337566927/fit_to_size/144x192
/39d52977da/1485386667 1x, https://imgv2-1-f.scribdassets.com/img/document/33756
6927/fit_to_size/288x384/501c40b435/1485386667 2x" class="lazy_loading
" alt="document"><div class="shadow_overlay"></div><div
class="action_layer"><div class="main_action"><div class=&q
uot;read_icon icon-ic_tableofcontents"></div><div class="play_icon ico
n-ic_audiobook_play_large"></div></div><div class="overlay"></div
></div></div><div class="under_title_wrapper"><div class="under_t
itle">Letter From Jeh Johnson</div></div></a></li><li class="document_
cell object_cell " data-object_type="document" data-object_id=&q
uot;261374478" data-track="trending" data-track_uuid="5l7n58
w9IYysqYGow55A7cvYW+s=" data-reading_progress="0"><a href="h
ttps://www.scribd.com/document/261374478/McCarthy-Memo" class="doc_lin
k "><div class="thumb object_cell_hover " style=""><img
data-src="https://imgv2-2-f.scribdassets.com/img/document/261374478/fit_to
_size/144x192/37db98732f/1428933086" data-srcset="https://imgv2-2-f.sc
ribdassets.com/img/document/261374478/fit_to_size/144x192/37db98732f/1428933086
1x, https://imgv2-1-f.scribdassets.com/img/document/261374478/fit_to_size/288x38
4/c3f236cfb1/1428933086 2x" class="lazy_loading" alt="docume
nt"><div class="shadow_overlay"></div><div class="action_lay
er"><div class="main_action"><div class="read_icon icon-ic_t
ableofcontents"></div><div class="play_icon icon-ic_audiobook_play_lar
ge"></div></div><div class="overlay"></div></div></div><div class
="under_title_wrapper"><div class="under_title">McCarthy Mem
o</div></div></a></li><li class="document_cell object_cell " data-obj
ect_type="document" data-object_id="324253148" data-track=&q
uot;trending" data-track_uuid="QdrhZv4SvnW9yQrmFWYfXNDBaWI=" data
-reading_progress="0"><a href="https://www.scribd.com/document/32
4253148/Attribution-of-Malicious-Cyber-Incidents-From-Soup-to-Nuts" class=&
quot;doc_link "><div class="thumb object_cell_hover " style="
;"><img data-src="https://imgv2-1-f.scribdassets.com/img/document/3242
53148/fit_to_size/144x192/8f7f38f426/1479246094" data-srcset="https://
imgv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/144x192/8f7f38f426
/1479246094 1x, https://imgv2-1-f.scribdassets.com/img/document/324253148/fit_to
_size/288x384/d1d93c8883/1479246094 2x" class="lazy_loading" alt=
"document"><div class="shadow_overlay"></div><div class=&quo
t;action_layer"><div class="main_action"><div class="read_ic
on icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiob
ook_play_large"></div></div><div class="overlay"></div></div></di
v><div class="under_title_wrapper"><div class="under_title">
Attribution of Malicious Cyber Incidents</div></div></a></li><li class="doc
ument_cell object_cell " data-object_type="document" data-object
_id="208832379" data-track="trending" data-track_uuid="
yMlUcrrEgkjUqzZaueoGSD+Jhms=" data-reading_progress="0"><a href=&
quot;https://www.scribd.com/document/208832379/US-Army-FM-3-38-Cyber-Electromagn
etic-Activities" class="doc_link "><div class="thumb object_
cell_hover " style=""><img data-src="https://imgv2-1-f.scrib
dassets.com/img/document/208832379/fit_to_size/144x192/280e2f58bb/1486731111&quo
t; data-srcset="https://imgv2-1-f.scribdassets.com/img/document/208832379/f
it_to_size/144x192/280e2f58bb/1486731111 1x, https://imgv2-2-f.scribdassets.com/
img/document/208832379/fit_to_size/288x384/a943227b07/1486731111 2x" class=
"lazy_loading" alt="document"><div class="shadow_overla
y"></div><div class="action_layer"><div class="main_action&q
uot;><div class="read_icon icon-ic_tableofcontents"></div><div class=&
quot;play_icon icon-ic_audiobook_play_large"></div></div><div class="o
verlay"></div></div></div><div class="under_title_wrapper"><div c
lass="under_title">US Army</div></div></a></li><li class="documen
t_cell object_cell " data-object_type="document" data-object_id=
"259428604" data-track="trending" data-track_uuid="Eofg
COJrwqKNkh0V4DdnMOUKnTY=" data-reading_progress="0"><a href="
;https://www.scribd.com/document/259428604/National-Cybersecurity-Protection-Adv
ancement-Act-Draft-3-20-15" class="doc_link "><div class="th
umb object_cell_hover " style=""><img data-src="https://imgv
2-1-f.scribdassets.com/img/document/259428604/fit_to_size/144x192/3fd2f17803/143
4873356" data-srcset="https://imgv2-1-f.scribdassets.com/img/document/
259428604/fit_to_size/144x192/3fd2f17803/1434873356 1x, https://imgv2-1-f.scribd
assets.com/img/document/259428604/fit_to_size/288x384/0dd2e86f13/1434873356 2x&q
uot; class="lazy_loading" alt="document"><div class="sh
adow_overlay"></div><div class="action_layer"><div class="ma
in_action"><div class="read_icon icon-ic_tableofcontents"></div><
div class="play_icon icon-ic_audiobook_play_large"></div></div><div cl
ass="overlay"></div></div></div><div class="under_title_wrapper&q
uot;><div class="under_title">National Cybersecurity Protection Advanc
ement Act_Draft 3-20-15</div></div></a></li></ul></div></div><div><img src="
;https://s2-f.scribdassets.com/images/home/logged_in/ic_home_control_left_arrow.
png?1494885498" alt="carousel previous" class="paddle page_l
eft carousel_prev" data-track="carousel:previous" aria-hidden=&qu
ot;true"><img src="https://s1-f.scribdassets.com/images/home/logged_in
/ic_home_control_right_arrow.png?1494885498" alt="carousel next"
class="paddle page_right carousel_next" data-track="carousel:next
" aria-hidden="true"></div></div><div class="carousel_scroll
bar"><div class="carousel_scrollbar_thumb"></div></div></div></di
v><script type="text/javascript">
//<![CDATA[
new Scribd.UI.Carousel("#autogen_id_503795426", {"page"
;:false,"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=",&quo
t;module_id":"eabG2pQt6DwIXCMsd6CQ3DOfnEg=","widget_name&quo
t;:"document_carousel:footer","sub_module":false})
//]]>
</script></div></div></div></div>"></div></div><script type="text/javascript">
//<![CDATA[
new Scribd.PdfsSsiRecommendations("#autogen_id_503778663", {"template":"discover
y","sidebar":[{"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=","module_id":"N2a3
+MutguorSFwcDBPpPFNyuho="},{"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=","mod
ule_id":"DptMFYFLDvkwurl9Bk6M50UHswg="},{"compilation_id":"8IbulvcG1Nw2brzpWJNQB
dys3lg=","module_id":"eabG2pQt6DwIXCMsd6CQ3DOfnEg="}]});
//]]>
</script>
</div></div></div><div class="document_column"><div class="toolbar_drop"></div><
div class="document_scroller carousel_scroll_parent"><div class="document_contai
ner"><script type="text/javascript">DocumentManager.scrollParent = $(".document_
scroller")[0]</script><style></style>
<script type='text/javascript'>
var defaultViewWidth = defaultViewWidth || 847.0;
var docManager = new DocumentManager("scroll", "web_pro" == "mobile"); // Our
global manager for this view page
window.docManager = docManager;
docManager.setEmbeddedDoc('False');
docManager.fontAggregatorHosts = ["https://html1-f.scribdassets.com", "https:/
/html2-f.scribdassets.com"];
docManager.assetPrefix = "1s3xyq203k4w6rdr";
docManager.addFont(11, "b", "ff11", "Verdana, Verdana, Geneva, sans-serif", "b
old", "normal");
docManager.addFont(10, "", "ff10", "Arial, Arial, Helvetica, sans-serif", "nor
mal", "normal");
docManager.addFont(1, "", "ff1", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(0, "", "ff0", "Times New Roman, Times, serif", "normal", "n
ormal");
docManager.addFont(3, "b", "ff3", "Times New Roman, Times, serif", "bold", "no
rmal");
docManager.addFont(2, "b", "ff2", "Courier New, Courier New, Courier6", "bold"
, "normal");
docManager.addFont(5, "", "ff5", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(4, "", "ff4", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(7, "", "ff7", "Courier New, Courier New, Courier6", "normal
", "normal");
docManager.addFont(6, "b", "ff6", "Times New Roman, Times, serif", "bold", "no
rmal");
docManager.addFont(9, "", "ff9", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(8, "", "ff8", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.displayType = "vector";
docManager.initStyles();
docManager.setPageWidths(defaultViewWidth);
docManager.setImageDomainSubstitution(/http:\/\/html.scribd.com/, ["https://ht
ml1-f.scribdassets.com", "https://html2-f.scribdassets.com"]);
</script>
<link rel='stylesheet' type='text/css' href='https://html2-f.scribdassets.com/st
atic/4gen.css?1492188167'/>
<div id='font_preload_bed' style='position:absolute; height: 1px; left: 0; top:0
; max-width: 100%; visibility: hidden; overflow: hidden'> </div>
<script type='text/javascript'>
docManager.setupTestElements();
</script>
<div class="outer_page_container">
<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [11, 8,
2, 10, 9, 1, 7], "pageNum": 1};
pageParams.containerElem = document.getElementById("outer_page_1");
pageParams.innerPageElem = document.getElementById("page1");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>
<div id="between_page_ads_1"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(1);
</script>
</div>
<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [8, 11,
2, 9, 1], "pageNum": 2};
pageParams.containerElem = document.getElementById("outer_page_2");
pageParams.innerPageElem = document.getElementById("page2");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>
<div id="between_page_ads_2"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(2);
</script>
</div>
<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [8, 1,
9, 7, 10, 2, 11, 5, 3, 0, 6], "pageNum": 3};
pageParams.containerElem = document.getElementById("outer_page_3");
pageParams.innerPageElem = document.getElementById("page3");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>
<div id="between_page_ads_3"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(3);
</script>
</div>
<div id="between_page_ads_4"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(4);
</script>
</div>
<div id="between_page_ads_5"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(5);
</script>
</div>
<!--[if IE]>
<script type='text/javascript'>
window.docManagerIEAdded = true;
if (document.observe) {
document.observe('dom:loaded', function () {
docManager.allPagesAdded();
});
} else {
window.attachEvent('onload', function () {
docManager.allPagesAdded();
});
}
</script>
<![endif]-->
<script type='text/javascript'>
if (window.docManagerIEAdded != true) {
docManager.allPagesAdded();
}
</script>
</div>
//]]>
</script></div><div class="actions"><button class="cancel_btn out
line_btn flat_btn" data-track="cancel" type="button"><s
pan class="scribd_spinner permanent_rotation" data-size="30"
></span><span class="flat_btn_content">cancel</span></button><button c
lass="ok_btn flat_btn" data-track="confirm"><span class=&quo
t;scribd_spinner permanent_rotation" data-size="30"></span><span
class="flat_btn_content">delete list</span></button></div>" data-delet
e_empty_collection="<div class="input_template_wrapper"><p class="
;confirm_text">Are you sure you want to delete this list?</p></div><div cla
ss="actions"><button class="cancel_btn outline_btn flat_btn"
data-track="cancel" type="button"><span class="scribd_
spinner permanent_rotation" data-size="30"></span><span class=&qu
ot;flat_btn_content">cancel</span></button><button class="ok_btn flat_
btn" data-track="confirm"><span class="scribd_spinner perman
ent_rotation" data-size="30"></span><span class="flat_btn_co
ntent">delete list</span></button></div>" data-multiple_remove_from_library
="<p class="confirm_text">Everything you selected will also be removed
from your lists.</p><div class="actions"><button class="cancel_b
tn outline_btn flat_btn" data-track="cancel" type="button&qu
ot;><span class="scribd_spinner permanent_rotation" data-size="30
"></span><span class="flat_btn_content">cancel</span></button><bu
tton class="ok_btn flat_btn" data-track="confirm"><span clas
s="scribd_spinner permanent_rotation" data-size="30"></span>
<span class="flat_btn_content">remove from Saved</span></button></div>
" data-remove_from_library="<p class="confirm_text">This book will als
o be removed from all your lists.</p><div class="actions"><button clas
s="cancel_btn outline_btn flat_btn" data-track="cancel" type
="button"><span class="scribd_spinner permanent_rotation" da
ta-size="30"></span><span class="flat_btn_content">cancel</s
pan></button><button class="ok_btn flat_btn" data-track="confirm&
quot;><span class="scribd_spinner permanent_rotation" data-size="
30"></span><span class="flat_btn_content">remove from Saved</span
></button></div>" data-change_library_state="<div class="change_library_sta
te_template"><p class="confirm_text">{{confirm_text}}</p><div cla
ss="actions"><button class="cancel_btn outline_btn flat_btn"
data-track="cancel" type="button"><span class="scribd_
spinner permanent_rotation" data-size="30"></span><span class=&qu
ot;flat_btn_content">cancel</span></button><button class="ok_btn flat_
btn" data-track="confirm"><span class="scribd_spinner perman
ent_rotation" data-size="30"></span><span class="flat_btn_co
ntent">ok</span></button></div></div>" data-remove_from_collection="<div cl
ass="input_template_wrapper large_input"><div class="autogen_clas
s_views_shared_input autogen_class_widgets_base " id="autogen_id_34134
3019"><div class="checkbox input_container input_trigger "><span
class="icon-ic_checkbox_outline icon checkbox_icon"></span><span class
="icon-ic_checkbox_fill icon checkbox_icon"></span><span class="l
abel">Remove them from Saved? (They ll also be removed from your other lists.)<
/span><input name="remove_from_collection_confirm" value="true&qu
ot; type="checkbox" class="rounded"></div></div><script type
="text/javascript">
//<![CDATA[
new Scribd.Input("#autogen_id_341343019", {selected: false});
//]]>
</script><div class="actions"><button class="cancel_btn outline_b
tn flat_btn" data-track="cancel" type="button"><span cl
ass="scribd_spinner permanent_rotation" data-size="30"></spa
n><span class="flat_btn_content">cancel</span></button><button class=&
quot;ok_btn flat_btn" data-track="confirm"><span class="scri
bd_spinner permanent_rotation" data-size="30"></span><span class=
"flat_btn_content">remove</span></button></div></div>" data-error="<di
v class="error_template"><p class="confirm_text">{{confirm_t
ext}}</p><div class="actions"><button class="ok_btn flat_btn"
; data-track="ok"><span class="scribd_spinner permanent_rotation&
quot; data-size="30"></span><span class="flat_btn_content">o
k</span></button></div></div>" data-audio_reading_progress="<div class="aud
io_reading_progress_template"><div class="confirm_text"><p>You&am
p;#39;re currently on {{currently_on}}. However, it looks like you listened to {
{listened_to}} on {{device_name}} {{time}}.</p><p>Jump {{jump_to}}?</p></div><di
v class="actions"><button class="cancel_btn flat_btn" data-t
rack="no"><span class="scribd_spinner permanent_rotation" da
ta-size="30"></span><span class="flat_btn_content">No</span>
</button><button class="ok_btn flat_btn" data-pos="{{JSON.stringi
fy(pos_data)}}" data-track="yes"><span class="scribd_spinner
permanent_rotation" data-size="30"></span><span class="flat
_btn_content">Yes</span></button></div></div>" data-delete_review="<div cla
ss="confirm_text"><div>{{content_line_one}}</div><div>{{content_line_t
wo}}</div></div><div class="actions"><button class="cancel_btn ou
tline_btn flat_btn" data-track="cancel" type="button"><
span class="scribd_spinner permanent_rotation" data-size="30"
;></span><span class="flat_btn_content">cancel</span></button><button
class="ok_btn flat_btn" data-track="confirm"><span class=&qu
ot;scribd_spinner permanent_rotation" data-size="30"></span><span
class="flat_btn_content">Delete review &amp; rating</span></butto
n></div>" data-notify_personalization="<p class="confirm_text">We&
#39;ve curated titles we think you&#39;ll love.</p><div class="actions&
quot;><button class="ok_btn flat_btn" data-track="confirm"><
span class="scribd_spinner permanent_rotation" data-size="30"
;></span><span class="flat_btn_content">Explore now</span></button></d
iv>" class="confirmation_lightbox_templates"></div></div></div></div><script typ
e="template" id="seo_roadblock_lb_new_basic" data-template="<div id="seo_ro
adblock_lb_new_basic" data-track_category="lightbox" class="
lightbox autogen_class_views_pdfs_seo_lightbox autogen_class_widgets_lightbox au
togen_class_widgets_base seo_lightbox new_basic" style="display: none;
" aria-labelledby="main_heading" role="dialog" tabIndex
="-1"><div class="wrapper"><button class="close_button&
quot; type="button"><span class="icon-ic_close"></span><span
class="visually_hidden">Close Dialog</span></button><div class="
content"><div class="inline_flash"></div><div class="header&
quot;><h1>Join the membership<br>for readers</h1><h2>Get monthly access to books
, audiobooks, documents, <br />and more</h2><button class="start_trial_btn
flat_btn"><span class="scribd_spinner permanent_rotation" data-si
ze="30"></span><span class="flat_btn_content">Read Free for
30 Days</span></button></div><div class="overlay"><div class="seo
_images"><div class="thumb is_book" style="background-image:
url('https://imgv2-1-f.scribdassets.com/img/audiobook/237900491/original/fit_to
_size/76x100/77cca26bbb/1494810783')"><div class="shadow_overlay"
></div></div><div class="thumb is_book" style="background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/237857482/original/fit_to_
size/76x100/fb1e567a16/1494834374')"><div class="shadow_overlay">
</div></div><div class="thumb is_book" style="background-image: u
rl('https://imgv2-1-f.scribdassets.com/img/audiobook/320128164/original/fit_to_s
ize/76x100/579f635903/1494817785')"><div class="shadow_overlay"><
/div></div><div class="thumb is_book" style="background-image: ur
l('https://imgv2-1-f.scribdassets.com/img/word_document/221042260/original/fit_t
o_size/76x100/5588d136e9/1494881704')"><div class="shadow_overlay"
;></div></div><div class="thumb is_book" style="background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/257846344/original/fit_to
_size/76x100/7895081ac3/1494850970')"><div class="shadow_overlay"
></div></div><div class="thumb is_book" style="background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/281637763/original/fit_to_
size/76x100/bd1ea869ea/1494881704')"><div class="shadow_overlay">
</div></div><div class="thumb is_book" style="background-image: u
rl('https://imgv2-2-f.scribdassets.com/img/word_document/224251604/original/fit_
to_size/76x100/f9e630bf5e/1494412120')"><div class="shadow_overlay&quo
t;></div></div><div class="thumb is_book" style="background-image
: url('https://imgv2-1-f.scribdassets.com/img/word_document/163638913/original/f
it_to_size/76x100/fa0fba5bf1/1494479035')"><div class="shadow_overlay&
quot;></div></div><div class="thumb is_book" style="background-im
age: url('https://imgv2-1-f.scribdassets.com/img/word_document/244157917/origina
l/fit_to_size/76x100/e54bb446c6/1494538317')"><div class="shadow_overl
ay"></div></div></div></div><div class="footer"><div class="
seo_perks"><span class="perk"><span class="icon icon-ic_hear
t"></span>Discover new books</span><span class="perk"><span class
="icon icon-ic_star_small_outline"></span>Read everywhere</span><span
class="perk"><span class="icon icon-ic_thumbsup_fill_small">
</span>Build your digital reading lists</span></div><div class="devices&quo
t;></div></div></div></div></div>"></script><div id="reading_progress_external_p
rogress_lightbox" data-track_category="lightbox" class="lightbox autogen_class_v
iews_shared_reading_progress_external_progress_lightbox autogen_class_widgets_li
ghtbox autogen_class_widgets_base" style="display: none;" aria-labelledby="main_
heading" role="dialog" tabIndex="-1"><div class="wrapper"><button class="close_b
utton" type="button"><span class="icon-ic_close"></span><span class="visually_hi
dden">Close Dialog</span></button><div class="content"><div class="inline_flash"
></div><p>We've moved you to where you read on your <span class='device_name'>ot
her device</span>.</p></div></div></div><div id="past_preview_progress_lightbox"
data-track_category="lightbox" class="lightbox autogen_class_views_shared_readi
ng_progress_past_preview_lightbox autogen_class_widgets_lightbox autogen_class_w
idgets_base" style="display: none;" aria-labelledby="main_heading" role="dialog"
tabIndex="-1"><div class="wrapper"><button class="close_button" type="button"><
span class="icon-ic_close"></span><span class="visually_hidden">Close Dialog</sp
an></button><div class="title">Get the full title to continue</div><div class="c
ontent"><div class="inline_flash"></div><p>Get the full title to continue readin
g from where you left off, or restart the preview.</p><div class="actions"><butt
on class="restart_preview outline_btn flat_btn"><span class="scribd_spinner perm
anent_rotation" data-size="30"></span><span class="flat_btn_content">Restart pre
view</span></button><span class="get_full_title"><span class="react_mount_node"
id="autogen_id_341321886"><div class="library_button"></div></span></span></div>
</div></div></div></div><script type="text/javascript">Scribd.Lightbox.initializ
e();</script><div id="pageboxes"></div><div class="autogen_class_views_shared_ho
vercards autogen_class_widgets_base" id="autogen_id_341340612"><div class="hover
card_drop has_document_cells"></div><script id="tpl_document_hovercard" type="te
mplate"><div class="autogen_class_views_shared_hovercards_document hovercard aut
ogen_class_widgets_base" data-track_category="["hovercard","{{ tr
ack_page_name }}"]" data-object_id="{{ id }}"><div class="hovercard_backgro
und"></div><div class="hovercard_content"><a class="inherit_tracking doc_link" h
ref="{{ url }}"><div class="doc_title hovercard_title above_cover" data-track="t
itle">{{ title }}</div><div class="cover_drop document_cell inherit_tracking" da
ta-track="cover"></div></a><div class="below_cover"><div class="document_data">{
[ if (!is_document) { ]}<div class="star_ratings_row data_row react_mount_node">
</div>{[ } ]}{[ if (is_article || is_issue) { ]}<div class="publisher">from <a c
lass="inherit_tracking" href="{{ publication.url }}" data-track="publication">{{
publication.name }}</a></div>{[ } else { ]}{[ if (typeof authors !== 'undefined
' && authors.length) { ]}<div class="publisher_row authors_row data_row">{[ if (
!is_document) { ]}by {[ } else { ]}uploaded by {[ } ]}{[ for (var i=0; i < autho
rs.length; i++) { ]}{[ if (i > 0) { ]}, {[ } ]}<a class="author inherit_tracking
" data-track="author" href="{{ authors[i].url }}">{{ authors[i].name }}</a>{[ }
]}</div>{[ } else { ]}<div class="publisher_row data_row"><a class="inherit_trac
king" href="{{ publisher.url }}" data-track="publisher">{{ publisher.name }}</a>
</div>{[ } ]}{[ } ]}<div class="page_count">{{ length }}</div></div>{[ if (typeo
f download_url !== undefined && download_url) { ]}<button class="download_btn in
herit_tracking slim flat_btn"><span class="scribd_spinner permanent_rotation" da
ta-size="30"></span><span class="flat_btn_content">Download</span></button>{[ }
]}<div class="library_button_container react_mount_node"></div></div></div></div
></script><script id="tpl_collection_hovercard" type="template"><div class="auto
gen_class_views_shared_hovercards_collection hovercard autogen_class_widgets_bas
e" data-track_category="hovercard"><div class="hovercard_background"></div><div
class="hovercard_content"><div class="collection_title hovercard_title above_cov
er"><a href="{{ url }}">{{ title }}</a></div><a href="{{ url }}"><div class="cov
er_drop collection_cell"></div></a><div class="below_cover"><div class="collecti
on_data"><div>List</div><div class="item_count">{{ formatted_count }}</div></div
><a href="{{ url }}" class="view_collection_btn flat_btn"><span class="scribd_sp
inner permanent_rotation" data-size="30"></span><span class="flat_btn_content">V
iew List</span></a></div></div></div></script></div><div id="fb-root"></div>
<script type="text/javascript">
Scribd.Facebook.setup()
</script><script src="https://apis.google.com/js/platform.js?onload=googleOnLoad
" async="1" defer="1"></script><script type="text/javascript" src="//static.crit
eo.net/js/ld/ld.js" async="true"></script><script type="text/javascript">Scribd.
TranslationsAggregator.aggregate();
new Scribd.ReadingProgress.ExternalProgressLightbox(reading_progress_exter
nal_progress_lightbox, {"track_page":"pdfs"});
Scribd.R.render(Scribd.R.Shared.React.LibraryButton({"actions_select":fals
e,"audiobook_sample_url":null,"check_in_collection_url":"https://www.scribd.com/
book-preview/290788315/check_in_collection","credit_lightbox_url":"https://www.s
cribd.com/credit_purchases/credit_lightbox/290788315","credit_restricted":false,
"document_id":290788315,"document_type":"document","event_container_id":null,"ex
tra_button_classes":"","force_get_full_title":true,"free_trial_url":"/archive/pm
p_checkout?doc=290788315\u0026metadata=%7B%22context%22%3A%22pmp%22%2C%22page%22
%3A%22read%22%2C%22action%22%3A%22start_trial%22%2C%22logged_in%22%3Atrue%2C%22p
latform%22%3A%22web%22%7D","in_player":false,"is_series_canonical":false,"orient
ation":"auto","page":"read","params":{},"paused":false,"show_get_full_title":tru
e,"show_preview":true,"start_reading_url":"https://www.scribd.com/document/29078
8315/Notes-for-Presentation-Malware","subscriber":false,"get_title_text":"Get Fu
ll Title","item":{"id":290788315,"in_library":true},"lists":{"collections":[],"c
ount":0,"create_list_url":"https://www.scribd.com/document_collections","load_mo
re_url":"https://www.scribd.com/saved/lists/2"},"is_mobile":false,"app_button_pr
ops":{"app_url":null,"store_url":"https://itunes.apple.com/us/app/scribd-million
s-books-audiobooks/id542557212?mt=8\u0026pt=298534","track_url":"https://www.scr
ibd.com/mobile/app/document_roadblock","document_id":290788315,"classes":"app_bt
n","cta":"Read preview"}}), $("#autogen_id_341321886")[0]);
new Scribd.ReadingProgress.PastPreviewLightbox(past_preview_progress_light
box, {"credit_restricted":false,"track_page":"books"});
Scribd.R.render(Scribd.R.Shared.React.Upvotes({"doc_id":290788315,"user_ra
ting":null,"rating_count":0,"ratings_path":"https://www.scribd.com/ratings.json?
word_document_id=290788315","upvote_count":0,"downvote_count":0,"score":0.0,"vie
ws":"4","active":true,"show_stats":true}), $("#autogen_id_341327615")[0]);
Scribd.R.render(Scribd.R.Shared.React.LibraryButton({"actions_select":true
,"audiobook_sample_url":null,"check_in_collection_url":"https://www.scribd.com/b
ook-preview/290788315/check_in_collection","credit_lightbox_url":"https://www.sc
ribd.com/credit_purchases/credit_lightbox/290788315","credit_restricted":false,"
document_id":290788315,"document_type":"document","event_container_id":null,"ext
ra_button_classes":"outline_btn","force_get_full_title":false,"free_trial_url":n
ull,"in_player":false,"is_series_canonical":false,"orientation":"bottom","page":
null,"params":{},"paused":false,"show_get_full_title":true,"show_preview":false,
"start_reading_url":"https://www.scribd.com/document/290788315/Notes-for-Present
ation-Malware","subscriber":false,"get_title_text":"Get Full Title","item":{"id"
:290788315,"in_library":true},"lists":{"collections":[],"count":0,"create_list_u
rl":"https://www.scribd.com/document_collections","load_more_url":"https://www.s
cribd.com/saved/lists/2"},"is_mobile":false,"app_button_props":{"app_url":null,"
store_url":"https://itunes.apple.com/us/app/scribd-millions-books-audiobooks/id5
42557212?mt=8\u0026pt=298534","track_url":"https://www.scribd.com/mobile/app/doc
ument_roadblock","document_id":290788315,"classes":"app_btn","cta":"Read preview
"}}), $("#autogen_id_341324130")[0]);
Scribd.R.render(Scribd.R.Shared.React.SearchInput({"focused":false,"query"
:null,"redirect_to_app":true,"keep_suggester_on_blur":false}), $("#autogen_id_34
1316533")[0]);
Scribd.R.render(Scribd.R.Shared.React.SearchInput({"focused":false,"query"
:null,"redirect_to_app":true,"keep_suggester_on_blur":true}), $("#autogen_id_341
337306")[0]);
new Scribd.Header("#global_header", {"default_content_pool_id":10});
if (!Scribd.is_mobile) {
Scribd.BookPreview.bind_links("read2:show");
}