Sie sind auf Seite 1von 59

<!DOCTYPE HTML><html xmlns="http://www.w3.

org/1999/xhtml" xml:lang="en" lang="en


" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.
com/2008/fbml"><head prefix="og: http://ogp.me/ns# scribd-com: http://ogp.me/ns/
apps/scribd-com#">
<script>
(function(d) {
var e = d.createElement('script');
e.src = d.location.protocol + '//tag.bounceexchange.com/1766/i.js';
e.async = true;
d.getElementsByTagName("head")[0].appendChild(e);
}(document));
</script>
<!-- Thank you for choosing Sonic --><title>Notes for Presentation Malware |
Malware | Ransomware</title><meta http-equiv="content-type" content="text/html;
charset=UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="csrf-param" content="authenticity_token" />
<meta name="csrf-token" content="X0oDFTAY5NsbvqchxBszcPMc/pJJoY1yCZkxGr93V
H4=" />
<meta property="og:site_name" content="Scribd"><meta property="og:title" con
tent="Notes for Presentation Malware | Malware | Ransomware"><meta property="fb:
app_id" content="136494494209"><meta name="logged_in_status" content="logged_in"
><meta name="description" content="Notes for Presentation Malware - Free downloa
d as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online f
or free."><link rel="image_src" href="https://imgv2-1-f.scribdassets.com/img/doc
ument/290788315/original/e1015d07c4/1494924483"><meta property="og:type" content
="scribd-com:document"><meta property="og:url" content="https://www.scribd.com/d
ocument/290788315/Notes-for-Presentation-Malware"><meta property="og:title" cont
ent="Notes for Presentation Malware"><meta property="og:description" content="Ma
lware Presentation for computer crime law"><meta property="og:image" content="ht
tps://imgv2-1-f.scribdassets.com/img/document/290788315/original/e1015d07c4/1494
924483"><meta name="twitter:card" content="summary"><meta name="twitter:url" con
tent="https://www.scribd.com/document/290788315/Notes-for-Presentation-Malware">
<meta name="twitter:title" content="Notes for Presentation Malware"><meta name="
twitter:description" content="Malware Presentation for computer crime law"><meta
name="twitter:image" content="https://imgv2-1-f.scribdassets.com/img/document/2
90788315/original/e1015d07c4/1494924483"><meta name="twitter:site" content="@Scr
ibd"><meta name="twitter:site:id" content="14167997"><link rel="alternate" media
="only screen and (max-width: 640px)" href="https://www.scribd.com/mobile/docume
nt/290788315/Notes-for-Presentation-Malware"><link rel="alternate" hreflang="x-d
efault" href="https://www.scribd.com/document/290788315/Notes-for-Presentation-M
alware"><link rel="alternate" hreflang="en" href="https://www.scribd.com/documen
t/290788315/Notes-for-Presentation-Malware"><link rel="alternate" hreflang="es"
href="https://es.scribd.com/document/290788315/Notes-for-Presentation-Malware"><
!--[if lt IE 8]>
<link href="https://s2-f.scribdassets.com/aggregated/css/chrome.css?1494885498"
media="screen" rel="stylesheet" type="text/css" />
<link href="https://s2-f.scribdassets.com/aggregated/css/pdfs.css?1494885402" me
dia="screen" rel="stylesheet" type="text/css" />
<link href="https://s2-f.scribdassets.com/aggregated/css/discover.css?1494885402
" media="screen" rel="stylesheet" type="text/css" />
<![endif]-->
<!--[if gte IE 8]>
<link href="https://s2-f.scribdassets.com/aggregated/css_img/chrome.css?14948854
98" media="screen" rel="stylesheet" type="text/css" />
<link href="https://s1-f.scribdassets.com/aggregated/css_img/pdfs.css?1494885402
" media="screen" rel="stylesheet" type="text/css" />
<link href="https://s2-f.scribdassets.com/aggregated/css_img/discover.css?149488
5402" media="screen" rel="stylesheet" type="text/css" />
<![endif]-->
<!--[if !IE]> -->
<link href="https://s2-f.scribdassets.com/aggregated/css_img/chrome.css?14948854
98" media="screen" rel="stylesheet" type="text/css" />
<link href="https://s1-f.scribdassets.com/aggregated/css_img/pdfs.css?1494885402
" media="screen" rel="stylesheet" type="text/css" />
<link href="https://s2-f.scribdassets.com/aggregated/css_img/discover.css?149488
5402" media="screen" rel="stylesheet" type="text/css" />
<!-- <![endif]--><script type="text/javascript" src="/options/exposed_to_client.
js?1494924300="></script><script type="text/javascript">
window.Scribd = window.Scribd || {};
window.Scribd.translations = window.Scribd.translations || [];
Scribd.rails_env = "production";
Scribd.current_ca = "current_ca:8CvwoqU2Uyj0HstkpJQBBA==-LaTPIdTHGk9u0qnR0
YX3uMFVmAk=";
Scribd.is_mobile = false;
Scribd.page_name = "doc";</script><!--[if IE 6]><script type="text/javascrip
t">Scribd.ie=6</script><![endif]--><!--[if IE 7]><script type="text/javascript">
Scribd.ie=7</script><![endif]--><!--[if IE 8]><script type="text/javascript">Scr
ibd.ie=8</script><![endif]--><!--[if IE 9]><script type="text/javascript">Scribd
.ie=9</script><![endif]--><!--[if IE 10]><script type="text/javascript">Scribd.i
e=10</script><![endif]--><!--[if IE 11]><script type="text/javascript">Scribd.ie
=11</script><![endif]--><!-- testing geoip ssi for ads --><script>if(!window.Scr
ibd){window.Scribd={};}window.Scribd._geo_ssi_value="FR";</script>
<!-- end testing geoip ssi for ads --><script src="https://s2-f.scribdassets.com
/aggregated/javascript/chrome_en_US.js?1494885498" type="text/javascript"></scri
pt>
<script src="https://s2-f.scribdassets.com/aggregated/javascript/pdfs_en_US.js?1
494885498" type="text/javascript"></script>
<script src="https://s1-f.scribdassets.com/aggregated/javascript/discover_en_US.
js?1494885402" type="text/javascript"></script><script type="text/javascript">
var _gaq = _gaq || [];
_gaq.push(['_setAccount', "UA-443684-2"]);
_gaq.push(['_setCustomVar', 1, 'logged_in', 'true', 1]);
_gaq.push(['_setCustomVar', 2, 'fb_setup_context', 'none', 1]);
_gaq.push(['_setCustomVar', 3, 'domain', document.location.host, 3]);
(function(){
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.a
sync = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://w
ww') + '.google-analytics.com/ga.js';
var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefor
e(ga, s);
_gaq.push(['_trackPageview']);
})();
</script>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o
),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a
,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', "UA-443684-23",{
'cookieDomain': 'scribd.com',
'sampleRate': 1
});
ga('create', "UA-443684-25", 'auto', {'name': 'pmp_users'});
ga('set', 'dimension1', true);
ga('set', 'dimension2', false);
ga('send', 'pageview');

ga(function(tracker) {
var cookie_jar = new CookieJar({ path: '/', expires: (60 * 60 * 24 * 365 *
2)});
cookie_jar.put('ga_clientid', tracker.get('clientId'));
});
</script>
<link rel="canonical" href="https://www.scribd.com/document/290788315/Notes-for-
Presentation-Malware"><script type="text/javascript">
Scribd.logged_in = true;
Scribd.current_user = {"is_facebook_user":false,"is_google_user":false,"id
":358063782,"active_archive_purchase":false,"pmp_subscriber":false,"login":"asus
7hael","has_purchased":false,"content_pool_ids":[10],"display_language_bar":fals
e,"has_email":true,"language_id":1,"country":"FR","country_id":104};
Scribd.browser_uuid = "401ec340-9cf6-0134-8992-0025902de78c";
Scribd.user_data = {
current_user_country: "FR",
current_user_country_id: 104,
}
Scribd.user_data.is_subscriber = false;
Scribd.user_data.is_pmp = false;
</script><script type="text/javascript">Scribd.eligible_for_seo_roadblock
= true;Scribd.current_doc = {"id":290788315,"title":"Notes for Presentation Malw
are","private":false,"page_count":5,"url":"https://www.scribd.com/document/29078
8315/Notes-for-Presentation-Malware","download_url":"https://www.scribd.com/docu
ment_downloads/290788315","secret_password":null,"description":"Malware Presenta
tion for computer crime law","created_at":"11 / 23 / 2015","short_title":"Notes
for Presentation Malware","category_id":null,"converting":false,"paid":false,"re
ads":null,"thumbnail_url":"https://imgv2-2-f.scribdassets.com/img/document/29078
8315/54x70/29feb3d20e/1494924483","word_count":1067,"reading_speed_wpm":281,"boo
kmark":true,"author_id":56189718,"author_name":"Erin Jennings","author_url":"/us
er/56189718/Erin-Jennings","document_type":"document","price":"","reading_progre
ss":{"update_url":"https://www.scribd.com/reading_progress"},"access_key":"key-9
fJn9rkadMUk9OB09yz0","is_searchable":true,"is_owner":false,"is_private":false,"i
s_commentable":true,"is_downloadable":true,"is_deletable":true,"is_paid":false,"
is_archived":true,"is_comic":false,"is_audiobook":false,"is_sheet_music":false,"
show_archive_paywall":true,"view_restricted":false,"downloadable_for_premium_use
rs":true,"preferred_ext":null,"can_purchase":false,"signup_context":"archive","i
s_pmp":false,"language_id":1,"is_credit_restricted":false,"is_view_restricted_ar
chive":false};</script><style media="print">
.document_column, .document_column * {
display: none !important;
}
</style> <script type="text/javascript">
var I18n = I18n || {};
I18n.defaultLocale = "en_US";
I18n.locale = "en_US";
</script>
<script type="text/javascript">
window['$rat'] = ratInit(["https://rs1.scribd.com/","https://rs2.scribd.co
m/","https://rs3.scribd.com/","https://rs4.scribd.com/","https://rs5.scribd.com/
","https://rs6.scribd.com/","https://rs7.scribd.com/","https://rs8.scribd.com/"]
, {"user_id":358063782,"doc_id":290788315}, false);
$rat.root().withVid(function(vid) { $rat("gotvid", { vid: vid}) })
</script><script type="text/javascript">Scribd.tracker = new Scribd.Tracker(
document);</script><link rel="alternate" href="android-app://com.scribd.app.read
er0/http/www.scribd.com/document/290788315/Notes-for-Presentation-Malware?t=Note
s+for+Presentation+Malware"></head><body class="autogen_class_views_layouts_doc
autogen_class_views_layouts_legacy_web autogen_class_views_layouts_web autogen_c
lass_widgets_page autogen_class_widgets_base no_scrolling fixed_min_width" data-
revision="bc0ef9d8c51c6a86aa898f3e6d6f8d6a78c4e189"><div class="autogen_class_vi
ews_chrome_header autogen_class_widgets_base global_header" id="global_header" d
ata-track_category="header"><header class="header_upper "><a href="https://www.s
cribd.com/" title="Scribd" data-track="logo" class="header_logo"><h1 class="scri
bd_blue_long_logo"><span class="visually_hidden">Scribd</span></h1></a><div clas
s="browse_all_container"><a href="#" class="browse_all_btn icon_btn"><span class
="icon icon-ic_globalnav_browse"></span><span class="icon_btn_text">Explore</spa
n><span class="arrow icon-ic_down_arrow"></span></a></div><div class="autogen_cl
ass_views_chrome_browse_all_menu autogen_class_widgets_base browse_all_menu" id=
"autogen_id_553507997"><div class="menu_wrapper"><nav class="menu" arial-label="
Browse by Interests or Content Type"><span class="close_btn icon-ic_close" arial
-label="Close Browse Menu"></span><div class="browse_by_interest_container"><h2
class="browse_by_title by_interest">EXPLORE BY INTERESTS</h2><div class="autogen
_class_views_shared_interests_list autogen_class_widgets_base" id="autogen_id_55
3504671"><article class="all_interests"><div class="interest_block"><h3 class="t
op_level_interest parent_interest"><a href="https://www.scribd.com/explore/Caree
r-Money" class="interest_btn interest_link" data-interest_name="Career &amp; Mon
ey">Career &amp; Money</a></h3><ul class="second_level_interests"><li class="chi
ld_interest"><a href="https://www.scribd.com/explore/Career-Money/Business-Biogr
aphy-History" class="interest_btn interest_link" data-interest_name="Business Bi
ography &amp; History">Business Biography &amp; History</a></li><li class="child
_interest"><a href="https://www.scribd.com/explore/Career-Money/Entrepreneurship
" class="interest_btn interest_link" data-interest_name="Entrepreneurship">Entre
preneurship</a></li><li class="child_interest"><a href="https://www.scribd.com/e
xplore/Career-Money/Leadership-Mentoring" class="interest_btn interest_link" dat
a-interest_name="Leadership &amp; Mentoring">Leadership &amp; Mentoring</a></li>
<li class="child_interest"><a href="https://www.scribd.com/explore/Career-Money/
Money-Management" class="interest_btn interest_link" data-interest_name="Money M
anagement">Money Management</a></li><li class="child_interest"><a href="https://
www.scribd.com/explore/Career-Money/Time-Management" class="interest_btn interes
t_link" data-interest_name="Time Management">Time Management</a></li></ul></div>
<div class="interest_block"><h3 class="top_level_interest parent_interest"><a hr
ef="https://www.scribd.com/explore/Personal-Growth" class="interest_btn interest
_link" data-interest_name="Personal Growth">Personal Growth</a></h3><ul class="s
econd_level_interests"><li class="child_interest"><a href="https://www.scribd.co
m/explore/Personal-Growth/Happiness" class="interest_btn interest_link" data-int
erest_name="Happiness">Happiness</a></li><li class="child_interest"><a href="htt
ps://www.scribd.com/explore/Personal-Growth/Psychology" class="interest_btn inte
rest_link" data-interest_name="Psychology">Psychology</a></li><li class="child_i
nterest"><a href="https://www.scribd.com/explore/Personal-Growth/Relationships-P
arenting" class="interest_btn interest_link" data-interest_name="Relationships &
amp; Parenting">Relationships &amp; Parenting</a></li><li class="child_interest"
><a href="https://www.scribd.com/explore/Personal-Growth/Religion-Spirituality"
class="interest_btn interest_link" data-interest_name="Religion &amp; Spirituali
ty">Religion &amp; Spirituality</a></li><li class="child_interest"><a href="http
s://www.scribd.com/explore/Personal-Growth/Self-Improvement" class="interest_btn
interest_link" data-interest_name="Self-Improvement">Self-Improvement</a></li><
/ul></div><div class="interest_block"><h3 class="top_level_interest parent_inter
est"><a href="https://www.scribd.com/explore/Politics-Current-Affairs" class="in
terest_btn interest_link" data-interest_name="Politics &amp; Current Affairs">Po
litics &amp; Current Affairs</a></h3><ul class="second_level_interests"><li clas
s="child_interest"><a href="https://www.scribd.com/explore/Politics-Current-Affa
irs/Politics" class="interest_btn interest_link" data-interest_name="Politics">P
olitics</a></li><li class="child_interest"><a href="https://www.scribd.com/explo
re/Politics-Current-Affairs/Society" class="interest_btn interest_link" data-int
erest_name="Society">Society</a></li></ul></div><div class="interest_block"><h3
class="top_level_interest parent_interest"><a href="https://www.scribd.com/explo
re/Science-Tech" class="interest_btn interest_link" data-interest_name="Science
&amp; Tech">Science &amp; Tech</a></h3><ul class="second_level_interests"><li cl
ass="child_interest"><a href="https://www.scribd.com/explore/Science-Tech/Scienc
e" class="interest_btn interest_link" data-interest_name="Science">Science</a></
li><li class="child_interest"><a href="https://www.scribd.com/explore/Science-Te
ch/Tech" class="interest_btn interest_link" data-interest_name="Tech">Tech</a></
li></ul></div><div class="interest_block"><h3 class="top_level_interest parent_i
nterest"><a href="https://www.scribd.com/explore/Health-Fitness" class="interest
_btn interest_link" data-interest_name="Health &amp; Fitness">Health &amp; Fitne
ss</a></h3><ul class="second_level_interests"><li class="child_interest"><a href
="https://www.scribd.com/explore/Health-Fitness/Fitness" class="interest_btn int
erest_link" data-interest_name="Fitness">Fitness</a></li><li class="child_intere
st"><a href="https://www.scribd.com/explore/Health-Fitness/Nutrition" class="int
erest_btn interest_link" data-interest_name="Nutrition">Nutrition</a></li><li cl
ass="child_interest"><a href="https://www.scribd.com/explore/Health-Fitness/Spor
ts" class="interest_btn interest_link" data-interest_name="Sports">Sports</a></l
i><li class="child_interest"><a href="https://www.scribd.com/explore/Health-Fitn
ess/Wellness" class="interest_btn interest_link" data-interest_name="Wellness">W
ellness</a></li></ul></div><div class="interest_block"><h3 class="top_level_inte
rest parent_interest"><a href="https://www.scribd.com/explore/Lifestyle" class="
interest_btn interest_link" data-interest_name="Lifestyle">Lifestyle</a></h3><ul
class="second_level_interests"><li class="child_interest"><a href="https://www.
scribd.com/explore/Lifestyle/Arts-Languages" class="interest_btn interest_link"
data-interest_name="Arts &amp; Languages">Arts &amp; Languages</a></li><li class
="child_interest"><a href="https://www.scribd.com/explore/Lifestyle/Fashion-Beau
ty" class="interest_btn interest_link" data-interest_name="Fashion &amp; Beauty"
>Fashion &amp; Beauty</a></li><li class="child_interest"><a href="https://www.sc
ribd.com/explore/Lifestyle/Food-Wine" class="interest_btn interest_link" data-in
terest_name="Food &amp; Wine">Food &amp; Wine</a></li><li class="child_interest"
><a href="https://www.scribd.com/explore/Lifestyle/Home-Garden" class="interest_
btn interest_link" data-interest_name="Home &amp; Garden">Home &amp; Garden</a><
/li><li class="child_interest"><a href="https://www.scribd.com/explore/Lifestyle
/Travel" class="interest_btn interest_link" data-interest_name="Travel">Travel</
a></li></ul></div><div class="interest_block"><h3 class="top_level_interest pare
nt_interest"><a href="https://www.scribd.com/explore/Entertainment" class="inter
est_btn interest_link" data-interest_name="Entertainment">Entertainment</a></h3>
<ul class="second_level_interests"><li class="child_interest"><a href="https://w
ww.scribd.com/explore/Entertainment/Celebrity-Biography-Memoir" class="interest_
btn interest_link" data-interest_name="Celebrity Biography &amp; Memoir">Celebri
ty Biography &amp; Memoir</a></li><li class="child_interest"><a href="https://ww
w.scribd.com/explore/Entertainment/Pop-Culture" class="interest_btn interest_lin
k" data-interest_name="Pop Culture">Pop Culture</a></li></ul></div><div class="i
nterest_block"><h3 class="top_level_interest parent_interest"><a href="https://w
ww.scribd.com/explore/Biographies-History" class="interest_btn interest_link" da
ta-interest_name="Biographies &amp; History">Biographies &amp; History</a></h3><
ul class="second_level_interests"><li class="child_interest"><a href="https://ww
w.scribd.com/explore/Biographies-History/Biography-Memoir" class="interest_btn i
nterest_link" data-interest_name="Biography &amp; Memoir">Biography &amp; Memoir
</a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Biog
raphies-History/History" class="interest_btn interest_link" data-interest_name="
History">History</a></li></ul></div><div class="interest_block"><h3 class="top_l
evel_interest parent_interest"><a href="https://www.scribd.com/explore/Fiction"
class="interest_btn interest_link" data-interest_name="Fiction">Fiction</a></h3>
<ul class="second_level_interests"><li class="child_interest"><a href="https://w
ww.scribd.com/explore/Fiction/Children-s-YA" class="interest_btn interest_link"
data-interest_name="Children s &amp; YA">Children s &amp; YA</a></li><li class="child_in
terest"><a href="https://www.scribd.com/explore/Fiction/Classics" class="interes
t_btn interest_link" data-interest_name="Classic Literature">Classic Literature<
/a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Ficti
on/Contemporary-Fiction" class="interest_btn interest_link" data-interest_name="
Contemporary Fiction">Contemporary Fiction</a></li><li class="child_interest"><a
href="https://www.scribd.com/explore/Fiction/Historical-Fiction" class="interes
t_btn interest_link" data-interest_name="Historical Fiction">Historical Fiction<
/a></li><li class="child_interest"><a href="https://www.scribd.com/explore/Ficti
on/LGBTQ-Fiction" class="interest_btn interest_link" data-interest_name="LGBTQ F
iction">LGBTQ Fiction</a></li><li class="child_interest"><a href="https://www.sc
ribd.com/explore/Fiction/Mystery-Thriller-Crime" class="interest_btn interest_li
nk" data-interest_name="Mystery, Thriller &amp; Crime">Mystery, Thriller &amp; C
rime</a></li><li class="child_interest"><a href="https://www.scribd.com/explore/
Fiction/Romance" class="interest_btn interest_link" data-interest_name="Romance"
>Romance</a></li><li class="child_interest"><a href="https://www.scribd.com/expl
ore/Fiction/Science-Fiction-Fantasy" class="interest_btn interest_link" data-int
erest_name="Science Fiction &amp; Fantasy">Science Fiction &amp; Fantasy</a></li
></ul></div></article></div></div><div class="browse_by_content_type_container">
<h2 class="browse_by_title by_content_type">BROWSE BY CONTENT TYPE</h2><article
class="all_content_types"><ul class="content_type_list"><li><a href="https://www
.scribd.com/books" class="browse_btn content_type_btn books archive_onboarding_b
rowse_target" data-track="browse:books" data-content_type="books" data-loc="brow
se_menu"><div class="icon_and_text_wrapper"><span class="icon books icon-ic_smal
l_book_fill"></span><span class="content_type_name books">Books</span></div></a>
</li><li><a href="https://www.scribd.com/audiobooks" class="browse_btn content_t
ype_btn audiobooks " data-track="browse:audiobooks" data-content_type="audiobook
s" data-loc="browse_menu"><div class="icon_and_text_wrapper"><span class="icon a
udiobooks icon-ic_small_audiobook_fill"></span><span class="content_type_name au
diobooks">Audiobooks</span></div></a></li><li><a href="https://www.scribd.com/ar
ticles" class="browse_btn content_type_btn articles " data-track="browse:article
s" data-content_type="articles" data-loc="browse_menu"><div class="icon_and_text
_wrapper"><span class="icon articles icon-ic_small_articles_fill"></span><span c
lass="content_type_name articles">News &amp; Magazines</span></div></a></li><li>
<a href="https://www.scribd.com/sheetmusic" class="browse_btn content_type_btn s
heet_music " data-track="browse:sheet_music" data-content_type="sheet_music" dat
a-loc="browse_menu"><div class="icon_and_text_wrapper"><span class="icon sheet_m
usic icon-ic_small_songbook_fill"></span><span class="content_type_name sheet_mu
sic">Sheet Music</span></div></a></li></ul></article></div></nav></div></div><di
v class="search_input_container"><div class="autogen_class_views_chrome_search_i
nput_container autogen_class_widgets_base" id="autogen_id_341319771" data-track_
category="search_input_container"><span class="react_mount_node" id="autogen_id_
341316533"><div class="autogen_class_views_shared_react_search_input"><div class
="search_input_container"><form class="search_form"><span class="icon-ic_search
search_icon"></span><input class="search_input" placeholder="Search" type="text"
></form></div></div></span></div></div><div class="right_tools"><button class="r
esponsive_search_btn icon_btn" style="display:none"><span class="icon icon-ic_se
arch"></span></button><a href="https://www.scribd.com/upload-document" class="ic
on_btn upload_btn" data-track="upload" aria-label="upload a document"><span clas
s="icon icon-ic_globalnav_upload"></span><span class="icon_btn_text">Upload</spa
n></a><a href="https://www.scribd.com/saved" class="icon_btn library_btn archive
_onboarding_library_target" data-track="saved" arial-label="go to your library">
<span class="icon icon-ic_globalnav_saved_fill"></span><span class="icon_btn_tex
t">Saved</span></a><button class="autogen_class_views_chrome_user_util autogen_c
lass_widgets_base user_util user_util_btn" id="autogen_id_341317851" aria-label
="User Settings"><div class="user_menu_btn"><div class="autogen_class_views_shar
ed_persona_icon autogen_class_widgets_base persona_icon small" id="autogen_id_34
1338816" style="background-image: url(https://imgv2-2-f.scribdassets.com/img/wor
d_user/358063782/40x40/0119fa7b13/1494924483);"></div></div><div class="overflow
_icon icon-ic_overflowmenu"></div></button><div class="autogen_class_views_chrom
e_user_menu autogen_class_widgets_base user_menu logged_in" id="autogen_id_3413
39137"><span class="settings_menu_close_btn icon-ic_close" arial-label="close us
er settings menu"></span><div class="top"><div class="greeting user_name_row">Hi
, Asus Hael!</div></div><ul class="list"><div class="section_separator"></div><d
iv class="row_section"><li><a class="row view_profile_row" data-track="user_util
_view_profile_row" href="https://www.scribd.com/user/358063782/Asus-Hael">Public
Profile</a></li><li><a class="row account_btn" data-track="user_util_account" h
ref="/account-settings">Account Settings</a></li></div><div class="section_separ
ator"></div><div class="row_section"><li><a class="row upload_action_btn" data-t
rack="user_util_upload_action" href="https://www.scribd.com/upload-document">Upl
oad A Document</a></li><li><a class="row uploads_btn" data-track="user_util_my_u
ploads" href="/uploads">Document Uploads</a></li></div><div class="section_separ
ator"></div><div class="row_section"><li><a class="row invite_friends_btn" data
-track="user_util_referrals" href="https://www.scribd.com/referrals?source=user_
nav">Read for Free</a></li></div><div class="section_separator"></div><div class
="row_section"><li><a class="row help_btn" data-track="user_util_help" href="htt
p://support.scribd.com/login">Help</a></li><li><a class="row sign_out_btn" data-
track="user_util_log_out" href="/logout" return_to="/document/290788315/Notes-fo
r-Presentation-Malware">Sign Out</a></li></div></ul></div></div></header><div cl
ass="header_lower responsive_search"><div class="search_suggester_container"><di
v class="search_input_container"><div class="autogen_class_views_chrome_search_i
nput_container autogen_class_widgets_base" id="autogen_id_341336871" data-track_
category="search_input_container"><span class="react_mount_node" id="autogen_id_
341337306"><div class="autogen_class_views_shared_react_search_input"><div class
="search_input_container"><form class="search_form"><span class="icon-ic_search
search_icon"></span><input class="search_input" placeholder="Search" type="text"
></form></div></div></span></div></div><button class="close_responsive_search_bt
n icon-ic_close"></button></div></div></div><div class="global_wrapper"><div cla
ss="autogen_class_views_pdfs_show autogen_class_widgets_base" id="autogen_id_341
323444" data-track_category="pdfs" itemscope itemtype="http://schema.org/Creativ
eWork"><div style="height: 0; overflow: hidden"></div><div class="document_colum
ns_wrapper"><div class="sidebar_column"><div class="autogen_class_views_pdfs_sid
ebar autogen_class_widgets_base" id="autogen_id_341326497" data-track_category="
sidebar"><div class="padded_sidebar"><h1>Notes for Presentation Malware</h1><div
class="publish_info">Uploaded by <a href="https://www.scribd.com/user/56189718/
Erin-Jennings">Erin Jennings</a> on <span itemprop="dateCreated" class="publish_
date">Nov 23, 2015</span></div><div class="interest_pills"><a class="interest in
terest_link interest_pill" href="https://www.scribd.com/interest/Malware/explore
" data-category_id="36329">Malware</a><a class="interest interest_link interest_
pill" href="https://www.scribd.com/interest/Ransomware/explore" data-category_id
="55851">Ransomware</a><a class="interest interest_link interest_pill" href="htt
ps://www.scribd.com/interest/Computer-Security/explore" data-category_id="29476"
>Computer Security</a><a class="interest interest_link interest_pill" href="http
s://www.scribd.com/interest/Information-Governance/explore" data-category_id="47
477">Information Governance</a><a class="interest interest_link interest_pill" h
ref="https://www.scribd.com/interest/Computer-Security-Exploits/explore" data-ca
tegory_id="45685">Computer Security Exploits</a></div><div class="ratings_spacer
"><span class="react_mount_node" id="autogen_id_341327615" itemprop="aggregateRa
ting" itemscope itemtype="http://schema.org/AggregateRating"><div class="autogen
_class_views_shared_react_upvotes"><span itemprop="ratingValue">0.0</span> (<spa
n itemprop="ratingCount">0</span>)</div></span></div><!--total_views:93--><div c
lass="document_actions"><button class="action_button download_btn flat_btn"><spa
n class="scribd_spinner permanent_rotation" data-size="30"></span><span class="f
lat_btn_content">Download</span></button><span class="react_mount_node" id="auto
gen_id_341324130"><div class="library_button"></div></span></div><div class="sha
re_row"><div class="autogen_class_views_shared_sharing_buttons autogen_class_wid
gets_base sharing_buttons single_line" id="autogen_id_341325231" data-sharing_op
ts="{&quot;title&quot;:&quot;Notes for Presentation Malware&quot;,&quot;url&quot
;:&quot;https://www.scribd.com/document/290788315/Notes-for-Presentation-Malware
&quot;,&quot;description&quot;:&quot;Malware Presentation for co...&quot;,&quot;
thumbnail_url&quot;:&quot;https://imgv2-1-f.scribdassets.com/img/document/290788
315/original/e1015d07c4/1494924483&quot;}"><div class="facebook share_button"><a
href="#" class="share_facebook_btn" aria-label="Share on Facebook"><span class=
"icon icon-ic_facebook"></span></a></div><div class="twitter share_button"><a hr
ef="#" data-url="/book/290788315/Notes-for-Presentation-Malware" class="share_tw
itter_btn" data-text="I m reading Notes for Presentation Malware on @Scribd #ReadMor
e" aria-label="Share on Twitter"><span class="icon icon-ic_twitter"></span></a><
/div><div class="linkedin share_button"><a href="#" class="share_linkedin_btn" a
ria-label="Share on LinkedIn"><span class="icon icon-ic_linkedin"></span></a></d
iv><div class="email share_button"><a target="_blank" href="mailto:?subject=Read
%20Notes%20for%20Presentation%20Malware%20on%20Scribd&amp;body=Hi%20there%2C%20I
%E2%80%99m%20reading%20Notes%20for%20Presentation%20Malware%20on%20Scribd%20and%
20thought%20you%20might%20like%20it.%20Notes%20for%20Presentation%20Malware%20by
%20Erin%20Jennings%20https%3A%2F%2Fwww.scribd.com%2Fbook%2F290788315%2FNotes-for
-Presentation-Malware%20Scribd%20gives%20you%20monthly%20access%20to%20books%2C%
20audiobooks%2C%20and%20more%20-%20for%20less%20than%20the%20cost%20of%20a%20pap
erback.%20Join%20today%20and%20read%20free%20for%2030%20days.%20Find%20out%20mor
e%20at%3A%20http%3A%2F%2Fwww.scribd.com%2F" rel="nofollow" data-track="share_ema
il_btn" aria-label="Share by email"><span class="icon icon-ic_email"></span></a>
</div></div><div class="embed_cell"><a href="#" class="embed_btn" data-lightbox_
url="https://www.scribd.com/read/embed_dialog?id=290788315"><span class="icon ic
on-ic_embed"></span>Embed</a></div></div><div class="description"><div class="de
scription_content"><strong>Description: </strong>Malware Presentation for comput
er crime law</div><div class="see_more_row"><a href="#" class="see_more_btn text
_btn_alt">View More</a></div></div><div class="full_description visually_hidden"
><div class="description_text">Malware Presentation for computer crime law</div>
<div class="data_row"><strong>Copyright: </strong> All Rights Reserved</div><div c
lass="data_row"><strong>Download</strong> as DOCX, PDF, TXT or read online from
Scribd</div><div class="flag_document data_row"><a class="flag_document_btn" hre
f="javascript:void(0)" data-lightbox_url="https://www.scribd.com/read/flag_dialo
g?id=290788315">Flag for inappropriate content</a></div></div>
<div class="autogen_class_views_pdfs_ssi_recommendations autogen_class_widgets_b
ase" id="autogen_id_503778663"><div class="grouped_recommenders sidebar_recommen
der"><div class="recommender_group" data-track_opts="{&quot;compilation_id&quot;
:&quot;8IbulvcG1Nw2brzpWJNQBdys3lg=&quot;,&quot;module_id&quot;:&quot;N2a3+Mutgu
orSFwcDBPpPFNyuho=&quot;,&quot;widget_name&quot;:&quot;right sidebar&quot;}"><h3
class="autogen_class_views_pdfs_ssi_recommendations_recommender_title autogen_c
lass_widgets_base" id="autogen_id_503777555">Documents Similar To Notes for Pres
entation Malware</h3><div class="autogen_class_views_pdfs_sidebar_document_cells
autogen_class_widgets_base has_document_cells" id="autogen_id_503776001"><ul cl
ass="autogen_class_views_shared_carousels_document_cells autogen_class_widgets_b
ase" id="autogen_id_503783329"><li class="document_cell object_cell " data-obje
ct_type="document" data-object_id="328970290" data-track="select_all_recommendat
ions" data-track_uuid="HGwEnYWz1pJdANUuBnt8/fz2tQs=" data-reading_progress="0"><
a href="https://www.scribd.com/document/328970290/Best-Practices-for-Dealing-Wit
h-Phishing-and-Ransomware-pdf" class="doc_link "><div class="thumb object_cell_h
over " style=""><img src="https://imgv2-1-f.scribdassets.com/img/document/328970
290/fit_to_size/108x144/ebaad891f6/1477490595" srcset="https://imgv2-1-f.scribda
ssets.com/img/document/328970290/fit_to_size/108x144/ebaad891f6/1477490595 1x, h
ttps://imgv2-1-f.scribdassets.com/img/document/328970290/fit_to_size/216x288/60a
75d9760/1477490595 2x" alt="document"><div class="reading_progress_outer"><div c
lass="reading_progress_outer_dark_overlay"></div><div class="reading_progress_in
ner reading_progress_percentage" style="width: 0%"></div></div><div class="shado
w_overlay"></div><div class="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"></div><div class="related_data"><div><span class="related_title
">Best Practices for Dealing With Phishing and Ransomware.pdf</span></div><div c
lass="related_publisher"><span class="decorative">by</span> MasterPirate</div></
div></a></li><li class="document_cell object_cell " data-object_type="document"
data-object_id="55693580" data-track="select_all_recommendations" data-track_uu
id="V9DAmCQt+v5gjB6eC1lFfDPDrNg=" data-reading_progress="0"><a href="https://www
.scribd.com/document/55693580/Ds-Endpoint-Protection-Suite" class="doc_link "><d
iv class="thumb object_cell_hover " style=""><img src="https://imgv2-1-f.scribda
ssets.com/img/document/55693580/fit_to_size/108x144/69a3905867/1405915636" srcse
t="https://imgv2-1-f.scribdassets.com/img/document/55693580/fit_to_size/108x144/
69a3905867/1405915636 1x, https://imgv2-2-f.scribdassets.com/img/document/556935
80/fit_to_size/216x288/844a07aef1/1405915636 2x" alt="document"><div class="read
ing_progress_outer"><div class="reading_progress_outer_dark_overlay"></div><div
class="reading_progress_inner reading_progress_percentage" style="width: 0%"></d
iv></div><div class="shadow_overlay"></div><div class="action_layer"><div class=
"main_action"><div class="read_icon icon-ic_tableofcontents"></div><div class="p
lay_icon icon-ic_audiobook_play_large"></div></div><div class="overlay"></div></
div></div><div class="under_title_wrapper"></div><div class="related_data"><div>
<span class="related_title">Ds Endpoint Protection Suite</span></div><div class=
"related_publisher"><span class="decorative">by</span> alanyip168</div></div></a
></li><li class="document_cell object_cell " data-object_type="document" data-o
bject_id="337338756" data-track="select_all_recommendations" data-track_uuid="Jp
p00rpjSJ0xpBpyaX/iq0ajNp0=" data-reading_progress="0"><a href="https://www.scrib
d.com/document/337338756/Fort-i-Sandbox" class="doc_link "><div class="thumb obj
ect_cell_hover " style=""><img src="https://imgv2-2-f.scribdassets.com/img/docum
ent/337338756/fit_to_size/108x144/7f36719080/1485200200" srcset="https://imgv2-2
-f.scribdassets.com/img/document/337338756/fit_to_size/108x144/7f36719080/148520
0200 1x, https://imgv2-2-f.scribdassets.com/img/document/337338756/fit_to_size/2
16x288/0a86d8bd72/1485200200 2x" alt="document"><div class="reading_progress_out
er"><div class="reading_progress_outer_dark_overlay"></div><div class="reading_p
rogress_inner reading_progress_percentage" style="width: 0%"></div></div><div cl
ass="shadow_overlay"></div><div class="action_layer"><div class="main_action"><d
iv class="read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic
_audiobook_play_large"></div></div><div class="overlay"></div></div></div><div c
lass="under_title_wrapper"></div><div class="related_data"><div><span class="rel
ated_title">Fort i Sandbox</span></div><div class="related_publisher"><span clas
s="decorative">by</span> Pablo Daniel Mio</div></div></a></li></ul></div></div><di
v class="recommender_group" data-track_opts="{&quot;compilation_id&quot;:&quot;8
IbulvcG1Nw2brzpWJNQBdys3lg=&quot;,&quot;module_id&quot;:&quot;DptMFYFLDvkwurl9Bk
6M50UHswg=&quot;,&quot;widget_name&quot;:&quot;right sidebar&quot;}"><h3 class="
autogen_class_views_pdfs_ssi_recommendations_recommender_title autogen_class_wid
gets_base" id="autogen_id_503782827"><a class="title_link" href="https://www.scr
ibd.com/interest/Malware/docs" data-track data-track_rats="mc" data-track_uuid="
DptMFYFLDvkwurl9Bk6M50UHswg=">Documents About Malware</a></h3><div class="autoge
n_class_views_pdfs_sidebar_document_cells autogen_class_widgets_base has_documen
t_cells" id="autogen_id_503781461"><ul class="autogen_class_views_shared_carouse
ls_document_cells autogen_class_widgets_base" id="autogen_id_503780513"><li clas
s="document_cell object_cell " data-object_type="document" data-object_id="2559
79726" data-track="trending" data-track_uuid="9Oc37Zxxa/qoCVeBiTw2+aDx5mc=" data
-reading_progress="0"><a href="https://www.scribd.com/document/255979726/Equatio
n-Group-Questions-and-Answers" class="doc_link "><div class="thumb object_cell_h
over " style=""><img src="https://imgv2-2-f.scribdassets.com/img/document/255979
726/fit_to_size/108x144/1e8b54231a/1490777863" srcset="https://imgv2-2-f.scribda
ssets.com/img/document/255979726/fit_to_size/108x144/1e8b54231a/1490777863 1x, h
ttps://imgv2-1-f.scribdassets.com/img/document/255979726/fit_to_size/216x288/e4b
53a9490/1490777863 2x" alt="document"><div class="reading_progress_outer"><div c
lass="reading_progress_outer_dark_overlay"></div><div class="reading_progress_in
ner reading_progress_percentage" style="width: 0%"></div></div><div class="shado
w_overlay"></div><div class="action_layer"><div class="main_action"><div class="
read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook
_play_large"></div></div><div class="overlay"></div></div></div><div class="unde
r_title_wrapper"></div><div class="related_data"><div><span class="related_title
">Equation Group Questions and Answers</span></div><div class="related_publisher
"><span class="decorative">by</span> zerohedge</div></div></a></li><li class="do
cument_cell object_cell " data-object_type="document" data-object_id="36404495"
data-track="trending" data-track_uuid="+ZE2MsBPK8y8xJqlumEdWbyUadM=" data-readi
ng_progress="0"><a href="https://www.scribd.com/document/36404495/IBM-X-Force-Vu
lnerability-Threats-1H2010" class="doc_link "><div class="thumb object_cell_hove
r " style=""><img src="https://imgv2-2-f.scribdassets.com/img/document/36404495/
fit_to_size/108x144/706a21ced4/1363638672" srcset="https://imgv2-2-f.scribdasset
s.com/img/document/36404495/fit_to_size/108x144/706a21ced4/1363638672 1x, https:
//imgv2-2-f.scribdassets.com/img/document/36404495/fit_to_size/216x288/f0f5f0bf9
3/1363638672 2x" alt="document"><div class="reading_progress_outer"><div class="
reading_progress_outer_dark_overlay"></div><div class="reading_progress_inner re
ading_progress_percentage" style="width: 0%"></div></div><div class="shadow_over
lay"></div><div class="action_layer"><div class="main_action"><div class="read_i
con icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audiobook_play_
large"></div></div><div class="overlay"></div></div></div><div class="under_titl
e_wrapper"></div><div class="related_data"><div><span class="related_title">IBM
X-Force Vulnerability Threats 1H2010</span></div><div class="related_publisher">
<span class="decorative">by</span> TechCrunch</div></div></a></li><li class="doc
ument_cell object_cell " data-object_type="document" data-object_id="282565441"
data-track="trending" data-track_uuid="newKmRP7lWO0I76CHCKGmwvqavQ=" data-readi
ng_progress="0"><a href="https://www.scribd.com/doc/282565441/Framing-Dependenci
es-Introduced-by-Underground-Commoditization" class="doc_link "><div class="thum
b object_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.com/img/
document/282565441/fit_to_size/108x144/82edcc1b2d/1445135583" srcset="https://im
gv2-1-f.scribdassets.com/img/document/282565441/fit_to_size/108x144/82edcc1b2d/1
445135583 1x, https://imgv2-1-f.scribdassets.com/img/document/282565441/fit_to_s
ize/216x288/dcdffb542b/1445135583 2x" alt="document"><div class="reading_progres
s_outer"><div class="reading_progress_outer_dark_overlay"></div><div class="read
ing_progress_inner reading_progress_percentage" style="width: 0%"></div></div><d
iv class="shadow_overlay"></div><div class="action_layer"><div class="main_actio
n"><div class="read_icon icon-ic_tableofcontents"></div><div class="play_icon ic
on-ic_audiobook_play_large"></div></div><div class="overlay"></div></div></div><
div class="under_title_wrapper"></div><div class="related_data"><div><span class
="related_title">Framing Dependencies Introduced by Underground Commoditization<
/span></div><div class="related_publisher"><span class="decorative">by</span> An
dy Greenberg</div></div></a></li></ul></div></div><div class="recommender_group"
data-track_opts="{&quot;compilation_id&quot;:&quot;8IbulvcG1Nw2brzpWJNQBdys3lg=
&quot;,&quot;module_id&quot;:&quot;eabG2pQt6DwIXCMsd6CQ3DOfnEg=&quot;,&quot;widg
et_name&quot;:&quot;right sidebar&quot;}"><h3 class="autogen_class_views_pdfs_ss
i_recommendations_recommender_title autogen_class_widgets_base" id="autogen_id_5
03787955"><a class="title_link" href="https://www.scribd.com/interest/Computer-S
ecurity/docs" data-track data-track_rats="mc" data-track_uuid="eabG2pQt6DwIXCMsd
6CQ3DOfnEg=">Documents About Computer Security</a></h3><div class="autogen_class
_views_pdfs_sidebar_document_cells autogen_class_widgets_base has_document_cells
" id="autogen_id_503786802"><ul class="autogen_class_views_shared_carousels_docu
ment_cells autogen_class_widgets_base" id="autogen_id_503785931"><li class="docu
ment_cell object_cell " data-object_type="document" data-object_id="333290070"
data-track="trending" data-track_uuid="/AuF2+1gNYqqAoG3PKuJokTYxKM=" data-readin
g_progress="0"><a href="https://www.scribd.com/document/333290070/FCC-Response-1
2-05-2016" class="doc_link "><div class="thumb object_cell_hover " style=""><img
src="https://imgv2-1-f.scribdassets.com/img/document/333290070/fit_to_size/108x
144/ee7ee8c106/1481169383" srcset="https://imgv2-1-f.scribdassets.com/img/docume
nt/333290070/fit_to_size/108x144/ee7ee8c106/1481169383 1x, https://imgv2-1-f.scr
ibdassets.com/img/document/333290070/fit_to_size/216x288/f7dabf53ed/1481169383 2
x" alt="document"><div class="reading_progress_outer"><div class="reading_progre
ss_outer_dark_overlay"></div><div class="reading_progress_inner reading_progress
_percentage" style="width: 0%"></div></div><div class="shadow_overlay"></div><di
v class="action_layer"><div class="main_action"><div class="read_icon icon-ic_ta
bleofcontents"></div><div class="play_icon icon-ic_audiobook_play_large"></div><
/div><div class="overlay"></div></div></div><div class="under_title_wrapper"></d
iv><div class="related_data"><div><span class="related_title">FCC Response 12-05
-2016</span></div><div class="related_publisher"><span class="decorative">by</sp
an> MarkWarner</div></div></a></li><li class="document_cell object_cell " data-
object_type="document" data-object_id="290177134" data-track="trending" data-tra
ck_uuid="5FUQRU4PLaLojxyY+FeR8vTlKIs=" data-reading_progress="0"><a href="https:
//www.scribd.com/doc/290177134/IS-Encryption-Guide" class="doc_link "><div class
="thumb object_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.co
m/img/document/290177134/fit_to_size/108x144/0561298dda/1451534045" srcset="http
s://imgv2-1-f.scribdassets.com/img/document/290177134/fit_to_size/108x144/056129
8dda/1451534045 1x, https://imgv2-1-f.scribdassets.com/img/document/290177134/fi
t_to_size/216x288/97accccd96/1451534045 2x" alt="document"><div class="reading_p
rogress_outer"><div class="reading_progress_outer_dark_overlay"></div><div class
="reading_progress_inner reading_progress_percentage" style="width: 0%"></div></
div><div class="shadow_overlay"></div><div class="action_layer"><div class="main
_action"><div class="read_icon icon-ic_tableofcontents"></div><div class="play_i
con icon-ic_audiobook_play_large"></div></div><div class="overlay"></div></div><
/div><div class="under_title_wrapper"></div><div class="related_data"><div><span
class="related_title">IS Encryption Guide</span></div><div class="related_publi
sher"><span class="decorative">by</span> AlyssaBereznak</div></div></a></li><li
class="document_cell object_cell " data-object_type="document" data-object_id="
28994827" data-track="trending" data-track_uuid="VphbWCLYJtRhssc8f/WydXm8Oo8=" d
ata-reading_progress="0"><a href="https://www.scribd.com/document/28994827/USA-T
ODAY-Collegiate-Case-Study-Cybercrime" class="doc_link "><div class="thumb objec
t_cell_hover " style=""><img src="https://imgv2-1-f.scribdassets.com/img/documen
t/28994827/fit_to_size/108x144/700de10431/1358918063" srcset="https://imgv2-1-f.
scribdassets.com/img/document/28994827/fit_to_size/108x144/700de10431/1358918063
1x, https://imgv2-2-f.scribdassets.com/img/document/28994827/fit_to_size/216x28
8/557347933f/1358918063 2x" alt="document"><div class="reading_progress_outer"><
div class="reading_progress_outer_dark_overlay"></div><div class="reading_progre
ss_inner reading_progress_percentage" style="width: 0%"></div></div><div class="
shadow_overlay"></div><div class="action_layer"><div class="main_action"><div cl
ass="read_icon icon-ic_tableofcontents"></div><div class="play_icon icon-ic_audi
obook_play_large"></div></div><div class="overlay"></div></div></div><div class=
"under_title_wrapper"></div><div class="related_data"><div><span class="related_
title">USA TODAY Collegiate Case Study: Cybercrime</span></div><div class="relat
ed_publisher"><span class="decorative">by</span> USA TODAY Education</div></div>
</a></li></ul></div></div></div><div class="footer_rec_docs_html" data-html="<di
v class=&quot;footer_rec_docs discover&quot;><div class=&quot;autogen_class_view
s_discover_recommenders autogen_class_widgets_base&quot; id=&quot;autogen_id_503
784340&quot;><div class=&quot;main_column&quot;><div class=&quot;recommenders&qu
ot;><div class=&quot;autogen_class_views_discover_modules_carousel document_caro
usel module_row autogen_class_views_shared_carousels_carousel autogen_class_widg
ets_base has_paddles has_document_cells carousel_widget show_title document_caro
usel regular_doc_thumb_width&quot; id=&quot;autogen_id_503791075&quot; data-lazy
_images=&quot;true&quot;><div class=&quot;carousel_wrap&quot;><h3 class=&quot;ca
rousel_title&quot; data-track=&quot;select_all_recommendations&quot;>Documents S
imilar To Notes for Presentation Malware</h3><a href=&quot;#skip_carousel&quot;
class=&quot;carousel_skip_link&quot;>Skip carousel</a><div class=&quot;carousel_
outer&quot;><div class=&quot;carousel&quot;><div class=&quot;carousel_scrolling&
quot;><ul class=&quot;autogen_class_views_shared_carousels_document_cells autoge
n_class_widgets_base&quot; id=&quot;autogen_id_503790382&quot;><li class=&quot;d
ocument_cell object_cell &quot; data-object_type=&quot;document&quot; data-obje
ct_id=&quot;328970290&quot; data-track=&quot;select_all_recommendations&quot; da
ta-track_uuid=&quot;HGwEnYWz1pJdANUuBnt8/fz2tQs=&quot; data-reading_progress=&qu
ot;0&quot;><a href=&quot;https://www.scribd.com/document/328970290/Best-Practice
s-for-Dealing-With-Phishing-and-Ransomware-pdf&quot; class=&quot;doc_link &quot;
><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-sr
c=&quot;https://imgv2-2-f.scribdassets.com/img/document/328970290/fit_to_size/14
4x192/a051281653/1477490595&quot; data-srcset=&quot;https://imgv2-2-f.scribdasse
ts.com/img/document/328970290/fit_to_size/144x192/a051281653/1477490595 1x, http
s://imgv2-2-f.scribdassets.com/img/document/328970290/fit_to_size/288x384/a461bf
493a/1477490595 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;
><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;
><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofco
ntents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;
></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;u
nder_title_wrapper&quot;><div class=&quot;under_title&quot;>Best Practices for D
ealing With Phishing and Ransomware.pdf</div></div></a></li><li class=&quot;docu
ment_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_
id=&quot;55693580&quot; data-track=&quot;select_all_recommendations&quot; data-t
rack_uuid=&quot;V9DAmCQt+v5gjB6eC1lFfDPDrNg=&quot; data-reading_progress=&quot;0
&quot;><a href=&quot;https://www.scribd.com/document/55693580/Ds-Endpoint-Protec
tion-Suite&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_
hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdasse
ts.com/img/document/55693580/fit_to_size/144x192/548e42c447/1405915636&quot; dat
a-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/55693580/fit_to_s
ize/144x192/548e42c447/1405915636 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/55693580/fit_to_size/288x384/fe42cb0a37/1405915636 2x&quot; class=&quot;la
zy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;>
</div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><di
v class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pla
y_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&q
uot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&qu
ot;under_title&quot;>Ds Endpoint Protection Suite</div></div></a></li><li class=
&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot; da
ta-object_id=&quot;337338756&quot; data-track=&quot;select_all_recommendations&q
uot; data-track_uuid=&quot;Jpp00rpjSJ0xpBpyaX/iq0ajNp0=&quot; data-reading_progr
ess=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/337338756/Fort-i
-Sandbox&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_ho
ver &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets
.com/img/document/337338756/fit_to_size/144x192/becea31d66/1485200200&quot; data
-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/337338756/fit_to_s
ize/144x192/becea31d66/1485200200 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/337338756/fit_to_size/288x384/bc568e4ffa/1485200200 2x&quot; class=&quot;l
azy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;
></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><d
iv class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pl
ay_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&
quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&q
uot;under_title&quot;>Fort i Sandbox</div></div></a></li><li class=&quot;documen
t_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=
&quot;66445977&quot; data-track=&quot;select_all_recommendations&quot; data-trac
k_uuid=&quot;+RiHJjUijguvXYNEvCXZ7uWJGYs=&quot; data-reading_progress=&quot;0&qu
ot;><a href=&quot;https://www.scribd.com/document/66445977/Whitepaper-8-Things-T
hat-Could-Affect-IT-Security&quot; class=&quot;doc_link &quot;><div class=&quot;
thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://im
gv2-1-f.scribdassets.com/img/document/66445977/fit_to_size/144x192/04a3d5a383/13
99925335&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document
/66445977/fit_to_size/144x192/04a3d5a383/1399925335 1x, https://imgv2-2-f.scribd
assets.com/img/document/66445977/fit_to_size/288x384/72be0fcafc/1399925335 2x&qu
ot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;sha
dow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;mai
n_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><d
iv class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div cla
ss=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&qu
ot;><div class=&quot;under_title&quot;>Whitepaper 8 Things That Could Affect IT
Security</div></div></a></li><li class=&quot;document_cell object_cell &quot; d
ata-object_type=&quot;document&quot; data-object_id=&quot;221117876&quot; data-t
rack=&quot;select_all_recommendations&quot; data-track_uuid=&quot;U7+sRJFRkQOtDE
dDvVw65AoSWwE=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://w
ww.scribd.com/document/221117876/Computer-Security-and-You&quot; class=&quot;doc
_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;>
<img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/221117876/fi
t_to_size/144x192/03c62d0d7d/1398841937&quot; data-srcset=&quot;https://imgv2-1-
f.scribdassets.com/img/document/221117876/fit_to_size/144x192/03c62d0d7d/1398841
937 1x, https://imgv2-1-f.scribdassets.com/img/document/221117876/fit_to_size/28
8x384/bef5d5c4a9/1398841937 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;do
cument&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action
_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-
ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play
_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div c
lass=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Computer
Security and You</div></div></a></li><li class=&quot;document_cell object_cell
&quot; data-object_type=&quot;document&quot; data-object_id=&quot;271964844&quo
t; data-track=&quot;select_all_recommendations&quot; data-track_uuid=&quot;TijHJ
yaThG1jtUMhUPwKBemdVpU=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;
https://www.scribd.com/document/271964844/1-4-n-1-5-Security-and-Ethics-Workbook
-by-Inqilab-Patel&quot; class=&quot;doc_link &quot;><div class=&quot;thumb objec
t_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scr
ibdassets.com/img/document/271964844/fit_to_size/144x192/5066c28c37/1437284801&q
uot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/271964844
/fit_to_size/144x192/5066c28c37/1437284801 1x, https://imgv2-1-f.scribdassets.co
m/img/document/271964844/fit_to_size/288x384/f3e3c1cc0c/1437284801 2x&quot; clas
s=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_over
lay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action
&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class
=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot
;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div
class=&quot;under_title&quot;>1.4 n 1.5 Security and Ethics Workbook by Inqilab
Patel</div></div></a></li><li class=&quot;document_cell object_cell &quot; dat
a-object_type=&quot;document&quot; data-object_id=&quot;326590531&quot; data-tra
ck=&quot;select_all_recommendations&quot; data-track_uuid=&quot;JqdwEJQpOnf6qADr
qu+e7ao7jOc=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www
.scribd.com/document/326590531/Inoue-Daisuke-national-Ict-Institute&quot; class=
&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quo
t;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/326
590531/fit_to_size/144x192/546e685d79/1475730598&quot; data-srcset=&quot;https:/
/imgv2-2-f.scribdassets.com/img/document/326590531/fit_to_size/144x192/546e685d7
9/1475730598 1x, https://imgv2-1-f.scribdassets.com/img/document/326590531/fit_t
o_size/288x384/5dedcd796b/1475730598 2x&quot; class=&quot;lazy_loading&quot; alt
=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&qu
ot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_i
con icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audio
book_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></d
iv><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;
>Inoue Daisuke-national Ict Institute</div></div></a></li><li class=&quot;docume
nt_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id
=&quot;343423730&quot; data-track=&quot;select_all_recommendations&quot; data-tr
ack_uuid=&quot;Y+O0IXLaNVdnbPCBhKhrXNgl3IM=&quot; data-reading_progress=&quot;0&
quot;><a href=&quot;https://www.scribd.com/document/343423730/Lesson1-IAO101&quo
t; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; s
tyle=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/doc
ument/343423730/fit_to_size/144x192/a0511dd7c0/1490807391&quot; data-srcset=&quo
t;https://imgv2-2-f.scribdassets.com/img/document/343423730/fit_to_size/144x192/
a0511dd7c0/1490807391 1x, https://imgv2-2-f.scribdassets.com/img/document/343423
730/fit_to_size/288x384/a6c39e315d/1490807391 2x&quot; class=&quot;lazy_loading&
quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div
class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&qu
ot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon
-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div>
</div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_ti
tle&quot;>Lesson1_IAO101</div></div></a></li><li class=&quot;document_cell objec
t_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;346741
164&quot; data-track=&quot;select_all_recommendations&quot; data-track_uuid=&quo
t;DNkpQTxN5btuIRONIEWA1ta1CR0=&quot; data-reading_progress=&quot;0&quot;><a href
=&quot;https://www.scribd.com/document/346741164/Facebook-and-Information-Operat
ions-v1&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hov
er &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.
com/img/document/346741164/fit_to_size/144x192/a65e5bbf18/1493469280&quot; data-
srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/346741164/fit_to_si
ze/144x192/a65e5bbf18/1493469280 1x, https://imgv2-1-f.scribdassets.com/img/docu
ment/346741164/fit_to_size/288x384/6464fca5f3/1493469280 2x&quot; class=&quot;la
zy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;>
</div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><di
v class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pla
y_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&q
uot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&qu
ot;under_title&quot;>Facebook and Information Operations v1</div></div></a></li>
<li class=&quot;document_cell object_cell &quot; data-object_type=&quot;documen
t&quot; data-object_id=&quot;101865221&quot; data-track=&quot;select_all_recomme
ndations&quot; data-track_uuid=&quot;VO2vrocvhYhtyf8jEJvoIJg0zwc=&quot; data-rea
ding_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/101865
221/2011-11-09-Larry-Clinton-BrightTalk-Webinars-Evolution-of-Cyber-Threats-and-
Pub-Policy&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_
hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdasse
ts.com/img/document/101865221/fit_to_size/144x192/579ca240bd/1343932876&quot; da
ta-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/101865221/fit_to
_size/144x192/579ca240bd/1343932876 1x, https://imgv2-2-f.scribdassets.com/img/d
ocument/101865221/fit_to_size/288x384/c42c04fec1/1343932876 2x&quot; class=&quot
;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quo
t;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;>
<div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;
play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overla
y&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=
&quot;under_title&quot;>2011 11 09 Larry Clinton BrightTalk Webinars Evolution o
f Cyber Threats and Pub Policy</div></div></a></li><li class=&quot;document_cell
object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;
207524635&quot; data-track=&quot;select_all_recommendations&quot; data-track_uui
d=&quot;8wBtnobnII0Vo0SB58vJm3PPJwk=&quot; data-reading_progress=&quot;0&quot;><
a href=&quot;https://www.scribd.com/document/207524635/Get-Rid-of-ShopGlider-Dea
ls-Program-From-Your-Windows-System&quot; class=&quot;doc_link &quot;><div class
=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;htt
ps://imgv2-1-f.scribdassets.com/img/document/207524635/fit_to_size/144x192/91695
71bc6/1392639641&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/
document/207524635/fit_to_size/144x192/9169571bc6/1392639641 1x, https://imgv2-1
-f.scribdassets.com/img/document/207524635/fit_to_size/288x384/c9745ff6ba/139263
9641 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class
=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class
=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot
;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></di
v><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_
wrapper&quot;><div class=&quot;under_title&quot;>Get Rid of ShopGlider Deals Pro
gram From Your Windows System</div></div></a></li><li class=&quot;document_cell
object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;2
83668453&quot; data-track=&quot;select_all_recommendations&quot; data-track_uuid
=&quot;x1lI294BdAWvWGNPQtpXlhjrgL4=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/283668453/Contemporary-Isometric-on-
Computer-Network-Security-and-Privacy&quot; class=&quot;doc_link &quot;><div cla
ss=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;h
ttps://imgv2-1-f.scribdassets.com/img/document/283668453/fit_to_size/144x192/d4c
db2ac06/1445826313&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/im
g/document/283668453/fit_to_size/144x192/d4cdb2ac06/1445826313 1x, https://imgv2
-1-f.scribdassets.com/img/document/283668453/fit_to_size/288x384/4004bd4d9b/1445
826313 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div cla
ss=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div cla
ss=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&qu
ot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></
div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_titl
e_wrapper&quot;><div class=&quot;under_title&quot;>Contemporary Isometric on Com
puter Network Security and Privacy</div></div></a></li><li class=&quot;document_
cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&q
uot;195970101&quot; data-track=&quot;select_all_recommendations&quot; data-track
_uuid=&quot;QaYlbzFLM4mo0I0oJDZqogb3udk=&quot; data-reading_progress=&quot;0&quo
t;><a href=&quot;https://www.scribd.com/document/195970101/Security-Slides&quot;
class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; sty
le=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/docum
ent/195970101/fit_to_size/144x192/b01a17f327/1406029323&quot; data-srcset=&quot;
https://imgv2-1-f.scribdassets.com/img/document/195970101/fit_to_size/144x192/b0
1a17f327/1406029323 1x, https://imgv2-1-f.scribdassets.com/img/document/19597010
1/fit_to_size/288x384/d48f92be9e/1406029323 2x&quot; class=&quot;lazy_loading&qu
ot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div cl
ass=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot
;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-i
c_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></
div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_titl
e&quot;>Security+ Slides</div></div></a></li><li class=&quot;document_cell objec
t_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;242305
306&quot; data-track=&quot;select_all_recommendations&quot; data-track_uuid=&quo
t;OGHg0H9PMQeJk0e5DVRRjWXolWY=&quot; data-reading_progress=&quot;0&quot;><a href
=&quot;https://www.scribd.com/document/242305306/Seminar-14P-Diamonds-and-Paper-
Clips-Steps-Needed-to-Make-Your-University-Cybersecure-separate-registration-is-
required-242305306&quot; class=&quot;doc_link &quot;><div class=&quot;thumb obje
ct_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.sc
ribdassets.com/img/document/242305306/fit_to_size/144x192/84598f52c3/1412783960&
quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/24230530
6/fit_to_size/144x192/84598f52c3/1412783960 1x, https://imgv2-2-f.scribdassets.c
om/img/document/242305306/fit_to_size/288x384/0cf2cfed3f/1412783960 2x&quot; cla
ss=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_ove
rlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_actio
n&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div clas
s=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quo
t;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><di
v class=&quot;under_title&quot;>Seminar 14P - Diamonds and Paper Clips</div></di
v></a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&q
uot;document&quot; data-object_id=&quot;291912467&quot; data-track=&quot;select_
all_recommendations&quot; data-track_uuid=&quot;LJK1k8o2wWgXrZ8AmPCA27pyUbQ=&quo
t; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/doc/
291912467/u1l12-possible-threats&quot; class=&quot;doc_link &quot;><div class=&q
uot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https:
//imgv2-2-f.scribdassets.com/img/document/291912467/fit_to_size/144x192/40fc868c
97/1486664052&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/doc
ument/291912467/fit_to_size/144x192/40fc868c97/1486664052 1x, https://imgv2-1-f.
scribdassets.com/img/document/291912467/fit_to_size/288x384/dd9bd3e814/148666405
2 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&q
uot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&q
uot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;><
/div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><
div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wra
pper&quot;><div class=&quot;under_title&quot;>u1l12 possible threats </div></div
></a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&qu
ot;document&quot; data-object_id=&quot;305381111&quot; data-track=&quot;select_a
ll_recommendations&quot; data-track_uuid=&quot;P6F+2cbbk8K2XrJ+uUspz0lSJxU=&quot
; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/docum
ent/305381111/history-of-virtual-office-docx&quot; class=&quot;doc_link &quot;><
div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=
&quot;https://imgv2-1-f.scribdassets.com/img/document/305381111/fit_to_size/144x
192/f89f20eae5/1458458594&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets
.com/img/document/305381111/fit_to_size/144x192/f89f20eae5/1458458594 1x, https:
//imgv2-2-f.scribdassets.com/img/document/305381111/fit_to_size/288x384/b0786bd2
94/1458458594 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><
div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><
div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcont
ents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;><
/div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;und
er_title_wrapper&quot;><div class=&quot;under_title&quot;>history of virtual off
ice.docx</div></div></a></li><li class=&quot;document_cell object_cell &quot; d
ata-object_type=&quot;document&quot; data-object_id=&quot;309757709&quot; data-t
rack=&quot;select_all_recommendations&quot; data-track_uuid=&quot;gJn/pICneN/oxF
CvsUuHMfnvxss=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://w
ww.scribd.com/doc/309757709/ammar-jamil-resume&quot; class=&quot;doc_link &quot;
><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-sr
c=&quot;https://imgv2-2-f.scribdassets.com/img/document/309757709/fit_to_size/14
4x192/7c0f123d37/1486703121&quot; data-srcset=&quot;https://imgv2-2-f.scribdasse
ts.com/img/document/309757709/fit_to_size/144x192/7c0f123d37/1486703121 1x, http
s://imgv2-1-f.scribdassets.com/img/document/309757709/fit_to_size/288x384/5213c4
9711/1486703121 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;
><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;
><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofco
ntents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;
></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;u
nder_title_wrapper&quot;><div class=&quot;under_title&quot;>ammar jamil resume</
div></div></a></li><li class=&quot;document_cell object_cell &quot; data-object
_type=&quot;document&quot; data-object_id=&quot;316819631&quot; data-track=&quot
;select_all_recommendations&quot; data-track_uuid=&quot;mS9WmmBVUUwCDiAsEFq2s9YW
3rc=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.
com/presentation/316819631/Managing-Cyber-Risk&quot; class=&quot;doc_link &quot;
><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-sr
c=&quot;https://imgv2-2-f.scribdassets.com/img/document/316819631/fit_to_size/14
4x192/992a233076/1469767501&quot; data-srcset=&quot;https://imgv2-2-f.scribdasse
ts.com/img/document/316819631/fit_to_size/144x192/992a233076/1469767501 1x, http
s://imgv2-2-f.scribdassets.com/img/document/316819631/fit_to_size/288x384/d127fe
3f94/1469767501 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;
><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;
><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofco
ntents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;
></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;u
nder_title_wrapper&quot;><div class=&quot;under_title&quot;>Managing Cyber Risk<
/div></div></a></li><li class=&quot;document_cell object_cell &quot; data-objec
t_type=&quot;document&quot; data-object_id=&quot;265883053&quot; data-track=&quo
t;select_all_recommendations&quot; data-track_uuid=&quot;D+rFZ85/jm0/+ty2PVe1yhq
E6NI=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd
.com/document/265883053/Document-Management-Security-Retention-02-03-Sept-2015-K
uala-Lumpur-07-08-Sept-2015-Jakarta&quot; class=&quot;doc_link &quot;><div class
=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;htt
ps://imgv2-1-f.scribdassets.com/img/document/265883053/fit_to_size/144x192/ea622
8cc00/1432051334&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/
document/265883053/fit_to_size/144x192/ea6228cc00/1432051334 1x, https://imgv2-1
-f.scribdassets.com/img/document/265883053/fit_to_size/288x384/d74c03b30b/143205
1334 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class
=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class
=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot
;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></di
v><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_
wrapper&quot;><div class=&quot;under_title&quot;>Document Management, Security &
amp;amp; Retention 02 - 03 Sept 2015 Kuala Lumpur / 07 - 08 Sept 2015 Jakarta</d
iv></div></a></li><li class=&quot;document_cell object_cell &quot; data-object_
type=&quot;document&quot; data-object_id=&quot;78926086&quot; data-track=&quot;s
elect_all_recommendations&quot; data-track_uuid=&quot;3u8p0NFdpc+SvDTv0EJkCIOc88
s=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.co
m/document/78926086/Trojan&quot; class=&quot;doc_link &quot;><div class=&quot;th
umb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv
2-1-f.scribdassets.com/img/document/78926086/fit_to_size/144x192/b9a76bb7fd/1353
021772&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/7
8926086/fit_to_size/144x192/b9a76bb7fd/1353021772 1x, https://imgv2-2-f.scribdas
sets.com/img/document/78926086/fit_to_size/288x384/dfb5d60e23/1353021772 2x&quot
; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shado
w_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_
action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div
class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class
=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot
;><div class=&quot;under_title&quot;>Trojan</div></div></a></li><li class=&quot;
document_cell object_cell &quot; data-object_type=&quot;document&quot; data-obj
ect_id=&quot;266246808&quot; data-track=&quot;select_all_recommendations&quot; d
ata-track_uuid=&quot;ud8jGsndUzz5FchKyH4EdNNpYGE=&quot; data-reading_progress=&q
uot;0&quot;><a href=&quot;https://www.scribd.com/document/266246808/1-5-1-1-Lab-
Researching-Network-Attacks-and-Security-Audit-Tools&quot; class=&quot;doc_link
&quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img d
ata-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/266246808/fit_to_s
ize/144x192/39310664cc/1444951782&quot; data-srcset=&quot;https://imgv2-2-f.scri
bdassets.com/img/document/266246808/fit_to_size/144x192/39310664cc/1444951782 1x
, https://imgv2-2-f.scribdassets.com/img/document/266246808/fit_to_size/288x384/
ed36f5c270/1444951782 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document
&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer
&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tab
leofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large
&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&
quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>1.5.1.1 Lab -
Researching Network Attacks and Security Audit Tools</div></div></a></li><li cla
ss=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot;
data-object_id=&quot;168885028&quot; data-track=&quot;select_all_recommendation
s&quot; data-track_uuid=&quot;JCKevRWL+kGgpXVpVkp9vE6m1Ag=&quot; data-reading_pr
ogress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/168885028/ana
lysis&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover
&quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.co
m/img/document/168885028/fit_to_size/144x192/f95c4d43eb/1486500218&quot; data-sr
cset=&quot;https://imgv2-1-f.scribdassets.com/img/document/168885028/fit_to_size
/144x192/f95c4d43eb/1486500218 1x, https://imgv2-1-f.scribdassets.com/img/docume
nt/168885028/fit_to_size/288x384/91992c0bda/1486500218 2x&quot; class=&quot;lazy
_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></
div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div
class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_
icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quo
t;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot
;under_title&quot;>analysis</div></div></a></li><li class=&quot;document_cell ob
ject_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;924
82288&quot; data-track=&quot;select_all_recommendations&quot; data-track_uuid=&q
uot;t0iATE11CxzlOTVDzKdg/Jt+joA=&quot; data-reading_progress=&quot;0&quot;><a hr
ef=&quot;https://www.scribd.com/document/92482288/Windows-7-Enterprise-Desktop-S
upport-Technician&quot; class=&quot;doc_link &quot;><div class=&quot;thumb objec
t_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scr
ibdassets.com/img/document/92482288/fit_to_size/144x192/fdac78e0b2/1446163792&qu
ot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/92482288/f
it_to_size/144x192/fdac78e0b2/1446163792 1x, https://imgv2-1-f.scribdassets.com/
img/document/92482288/fit_to_size/288x384/12c0586d12/1446163792 2x&quot; class=&
quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay
&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&qu
ot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&q
uot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;ov
erlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div cl
ass=&quot;under_title&quot;>Windows 7 Enterprise Desktop Support Technician</div
></div></a></li><li class=&quot;document_cell object_cell &quot; data-object_ty
pe=&quot;document&quot; data-object_id=&quot;71014894&quot; data-track=&quot;sel
ect_all_recommendations&quot; data-track_uuid=&quot;Kg0InInLycSDRKKfrM7lVf2bQzo=
&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/
document/71014894/Resilex-network-access-and-authentication-policy&quot; class=&
quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot
;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/7101
4894/fit_to_size/144x192/a22935da3f/1405285902&quot; data-srcset=&quot;https://i
mgv2-1-f.scribdassets.com/img/document/71014894/fit_to_size/144x192/a22935da3f/1
405285902 1x, https://imgv2-2-f.scribdassets.com/img/document/71014894/fit_to_si
ze/288x384/45a5c2dee2/1405285902 2x&quot; class=&quot;lazy_loading&quot; alt=&qu
ot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;a
ction_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon
icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook
_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><
div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Res
ilex-network_access_and_authentication_policy</div></div></a></li><li class=&quo
t;document_cell object_cell &quot; data-object_type=&quot;document&quot; data-o
bject_id=&quot;93484031&quot; data-track=&quot;select_all_recommendations&quot;
data-track_uuid=&quot;sGKbvIN0FPupTRJYJ9ThqVDGxCI=&quot; data-reading_progress=&
quot;0&quot;><a href=&quot;https://www.scribd.com/presentation/93484031/Indusfac
e-Corporate-Overview&quot; class=&quot;doc_link &quot;><div class=&quot;thumb ob
ject_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.
scribdassets.com/img/document/93484031/fit_to_size/144x192/8b9a8652a8/1445567044
&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/9348403
1/fit_to_size/144x192/8b9a8652a8/1445567044 1x, https://imgv2-2-f.scribdassets.c
om/img/document/93484031/fit_to_size/288x384/54d666e776/1445567044 2x&quot; clas
s=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_over
lay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action
&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class
=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot
;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div
class=&quot;under_title&quot;>Indusface Corporate Overview</div></div></a></li>
<li class=&quot;document_cell object_cell &quot; data-object_type=&quot;documen
t&quot; data-object_id=&quot;321392442&quot; data-track=&quot;select_all_recomme
ndations&quot; data-track_uuid=&quot;spGdpedgT5jEWdMNFnWEmlyHQJg=&quot; data-rea
ding_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/321392
442/Damballa-Network-Security-Checkup-Trend-Report&quot; class=&quot;doc_link &q
uot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img dat
a-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/321392442/fit_to_siz
e/144x192/1a36e60ca3/1471379181&quot; data-srcset=&quot;https://imgv2-1-f.scribd
assets.com/img/document/321392442/fit_to_size/144x192/1a36e60ca3/1471379181 1x,
https://imgv2-1-f.scribdassets.com/img/document/321392442/fit_to_size/288x384/81
4a36cbb3/1471379181 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&q
uot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&q
uot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_table
ofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&q
uot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&qu
ot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Damballa Network
Security Checkup Trend Report</div></div></a></li><li class=&quot;document_cell
object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;
48678456&quot; data-track=&quot;select_all_recommendations&quot; data-track_uuid
=&quot;SEZUJ5A6jBn6pc0qC+TRggBGhYk=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/48678456/HBG-McAfee&quot; class=&quo
t;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&q
uot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/4867845
6/fit_to_size/144x192/0316d98046/1408433841&quot; data-srcset=&quot;https://imgv
2-1-f.scribdassets.com/img/document/48678456/fit_to_size/144x192/0316d98046/1408
433841 1x, https://imgv2-1-f.scribdassets.com/img/document/48678456/fit_to_size/
288x384/3a46bc2126/1408433841 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;
document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;acti
on_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon ico
n-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_pl
ay_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div
class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>HBG-Mc
Afee</div></div></a></li><li class=&quot;document_cell object_cell &quot; data-
object_type=&quot;document&quot; data-object_id=&quot;336813321&quot; data-track
=&quot;select_all_recommendations&quot; data-track_uuid=&quot;/dDG5m4g1/z8pbxvcd
qCRpvFg4I=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.s
cribd.com/document/336813321/mere-am-i-safe&quot; class=&quot;doc_link &quot;><d
iv class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&
quot;https://imgv2-2-f.scribdassets.com/img/document/336813321/fit_to_size/144x1
92/c7e40c1d88/1486742192&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.
com/img/document/336813321/fit_to_size/144x192/c7e40c1d88/1486742192 1x, https:/
/imgv2-1-f.scribdassets.com/img/document/336813321/fit_to_size/288x384/683a44417
a/1486742192 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><d
iv class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><d
iv class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofconte
nts&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></
div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;unde
r_title_wrapper&quot;><div class=&quot;under_title&quot;>mere am i safe</div></d
iv></a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&
quot;document&quot; data-object_id=&quot;243679973&quot; data-track=&quot;select
_all_recommendations&quot; data-track_uuid=&quot;gmtAQBbrsvgxzzZB8BBd+PX5hds=&qu
ot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/doc
ument/243679973/ensemble-pdf&quot; class=&quot;doc_link &quot;><div class=&quot;
thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://im
gv2-2-f.scribdassets.com/img/document/243679973/fit_to_size/144x192/2eade06f69/1
413814457&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/documen
t/243679973/fit_to_size/144x192/2eade06f69/1413814457 1x, https://imgv2-2-f.scri
bdassets.com/img/document/243679973/fit_to_size/288x384/35bac388cd/1413814457 2x
&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;
shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;
main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div
><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div
class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper
&quot;><div class=&quot;under_title&quot;>ensemble.pdf</div></div></a></li><li c
lass=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quo
t; data-object_id=&quot;261292348&quot; data-track=&quot;select_all_recommendati
ons&quot; data-track_uuid=&quot;tqJ+d8g8m4pM8TkdkYr1frOYLpc=&quot; data-reading_
progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/261292348/J
ewish-Voice-for-Peace-ad-on-Israeli-policy-The-Hill-5-8-15&quot; class=&quot;doc
_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;>
<img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/261292348/fi
t_to_size/144x192/a5cb339d2a/1428536469&quot; data-srcset=&quot;https://imgv2-1-
f.scribdassets.com/img/document/261292348/fit_to_size/144x192/a5cb339d2a/1428536
469 1x, https://imgv2-1-f.scribdassets.com/img/document/261292348/fit_to_size/28
8x384/4156eb53dc/1428536469 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;do
cument&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action
_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-
ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play
_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div c
lass=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Jewish V
oice for Peace ad on Israeli policy, The Hill 5/8/15</div></div></a></li></ul></
div></div><div><img src=&quot;https://s2-f.scribdassets.com/images/home/logged_i
n/ic_home_control_left_arrow.png?1494885498&quot; alt=&quot;carousel previous&qu
ot; class=&quot;paddle page_left carousel_prev&quot; data-track=&quot;carousel:p
revious&quot; aria-hidden=&quot;true&quot;><img src=&quot;https://s1-f.scribdass
ets.com/images/home/logged_in/ic_home_control_right_arrow.png?1494885498&quot; a
lt=&quot;carousel next&quot; class=&quot;paddle page_right carousel_next&quot; d
ata-track=&quot;carousel:next&quot; aria-hidden=&quot;true&quot;></div></div><di
v class=&quot;carousel_scrollbar&quot;><div class=&quot;carousel_scrollbar_thumb
&quot;></div></div></div></div><script type=&quot;text/javascript&quot;>
//<![CDATA[
new Scribd.UI.Carousel(&quot;#autogen_id_503791075&quot;, {&quot;page&quot
;:false,&quot;compilation_id&quot;:&quot;8IbulvcG1Nw2brzpWJNQBdys3lg=&quot;,&quo
t;module_id&quot;:&quot;N2a3+MutguorSFwcDBPpPFNyuho=&quot;,&quot;widget_name&quo
t;:&quot;document_carousel:footer&quot;,&quot;sub_module&quot;:false})

//]]>
</script><div class=&quot;autogen_class_views_discover_modules_carousel document
_carousel module_row autogen_class_views_shared_carousels_carousel autogen_class
_widgets_base has_paddles has_document_cells carousel_widget show_title document
_carousel regular_doc_thumb_width&quot; id=&quot;autogen_id_503789742&quot; data
-lazy_images=&quot;true&quot;><div class=&quot;carousel_wrap&quot;><h3 class=&qu
ot;carousel_title&quot; data-track=&quot;trending&quot;><a class=&quot;title_lin
k&quot; href=&quot;https://www.scribd.com/interest/Malware/docs&quot; data-track
data-track_rats=&quot;mc&quot; data-track_uuid=&quot;DptMFYFLDvkwurl9Bk6M50UHsw
g=&quot;>Documents About Malware</a></h3><a href=&quot;#skip_carousel&quot; clas
s=&quot;carousel_skip_link&quot;>Skip carousel</a><div class=&quot;carousel_oute
r&quot;><div class=&quot;carousel&quot;><div class=&quot;carousel_scrolling&quot
;><ul class=&quot;autogen_class_views_shared_carousels_document_cells autogen_cl
ass_widgets_base&quot; id=&quot;autogen_id_503788663&quot;><li class=&quot;docum
ent_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_i
d=&quot;255979726&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;9O
c37Zxxa/qoCVeBiTw2+aDx5mc=&quot; data-reading_progress=&quot;0&quot;><a href=&qu
ot;https://www.scribd.com/document/255979726/Equation-Group-Questions-and-Answer
s&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &qu
ot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/im
g/document/255979726/fit_to_size/144x192/4e010fa57f/1490777863&quot; data-srcset
=&quot;https://imgv2-1-f.scribdassets.com/img/document/255979726/fit_to_size/144
x192/4e010fa57f/1490777863 1x, https://imgv2-1-f.scribdassets.com/img/document/2
55979726/fit_to_size/288x384/08730911dd/1490777863 2x&quot; class=&quot;lazy_loa
ding&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div>
<div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div clas
s=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon
icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;><
/div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;und
er_title&quot;>Equation Group Questions and Answers</div></div></a></li><li clas
s=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot;
data-object_id=&quot;36404495&quot; data-track=&quot;trending&quot; data-track_u
uid=&quot;+ZE2MsBPK8y8xJqlumEdWbyUadM=&quot; data-reading_progress=&quot;0&quot;
><a href=&quot;https://www.scribd.com/document/36404495/IBM-X-Force-Vulnerabilit
y-Threats-1H2010&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object
_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scri
bdassets.com/img/document/36404495/fit_to_size/144x192/50bd1f09bc/1363638672&quo
t; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/36404495/fi
t_to_size/144x192/50bd1f09bc/1363638672 1x, https://imgv2-2-f.scribdassets.com/i
mg/document/36404495/fit_to_size/288x384/3d2c81e70b/1363638672 2x&quot; class=&q
uot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&
quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quo
t;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&qu
ot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;ove
rlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div cla
ss=&quot;under_title&quot;>IBM X-Force Vulnerability Threats 1H2010</div></div><
/a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&quot
;document&quot; data-object_id=&quot;282565441&quot; data-track=&quot;trending&q
uot; data-track_uuid=&quot;newKmRP7lWO0I76CHCKGmwvqavQ=&quot; data-reading_progr
ess=&quot;0&quot;><a href=&quot;https://www.scribd.com/doc/282565441/Framing-Dep
endencies-Introduced-by-Underground-Commoditization&quot; class=&quot;doc_link &
quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img da
ta-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/282565441/fit_to_si
ze/144x192/6844b6d77d/1445135583&quot; data-srcset=&quot;https://imgv2-2-f.scrib
dassets.com/img/document/282565441/fit_to_size/144x192/6844b6d77d/1445135583 1x,
https://imgv2-1-f.scribdassets.com/img/document/282565441/fit_to_size/288x384/6
d8c7bd18d/1445135583 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&
quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&
quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tabl
eofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&
quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&q
uot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Framing Depende
ncies Introduced by Underground Commoditization</div></div></a></li><li class=&q
uot;document_cell object_cell &quot; data-object_type=&quot;document&quot; data
-object_id=&quot;287932833&quot; data-track=&quot;trending&quot; data-track_uuid
=&quot;RedA5/Eoe2zcVe2M9NOoCvser4k=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/287932833/CryptoWall-Report&quot; cl
ass=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=
&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document
/287932833/fit_to_size/144x192/d78e5181fe/1448540856&quot; data-srcset=&quot;htt
ps://imgv2-1-f.scribdassets.com/img/document/287932833/fit_to_size/144x192/d78e5
181fe/1448540856 1x, https://imgv2-1-f.scribdassets.com/img/document/287932833/f
it_to_size/288x384/343dffdcca/1448540856 2x&quot; class=&quot;lazy_loading&quot;
alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class
=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;re
ad_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_a
udiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div
></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&q
uot;>CryptoWall Report</div></div></a></li><li class=&quot;document_cell object_
cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;30030022
8&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;uW3mkef4Z4bYBRx6Be
pzaZ85X6I=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.s
cribd.com/doc/300300228/Operation-Blockbuster-Report&quot; class=&quot;doc_link
&quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img d
ata-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/300300228/fit_to_s
ize/144x192/a8b3c4e1d0/1494728639&quot; data-srcset=&quot;https://imgv2-2-f.scri
bdassets.com/img/document/300300228/fit_to_size/144x192/a8b3c4e1d0/1494728639 1x
, https://imgv2-2-f.scribdassets.com/img/document/300300228/fit_to_size/288x384/
366d46a052/1494728639 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document
&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer
&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tab
leofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large
&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&
quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Operation Bloc
kbuster Report</div></div></a></li><li class=&quot;document_cell object_cell &q
uot; data-object_type=&quot;document&quot; data-object_id=&quot;252398141&quot;
data-track=&quot;trending&quot; data-track_uuid=&quot;Vw53EcN9jODSwffTUREPYaJJBi
A=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.co
m/document/252398141/Internet-Security-Best-Practices-2014&quot; class=&quot;doc
_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;>
<img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/252398141/fi
t_to_size/144x192/e7e68e68e3/1426314604&quot; data-srcset=&quot;https://imgv2-1-
f.scribdassets.com/img/document/252398141/fit_to_size/144x192/e7e68e68e3/1426314
604 1x, https://imgv2-2-f.scribdassets.com/img/document/252398141/fit_to_size/28
8x384/b6c41ff4b7/1426314604 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;do
cument&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action
_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-
ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play
_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div c
lass=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Internet
Security Best Practices 2014</div></div></a></li><li class=&quot;document_cell
object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;2
55852040&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;oqiLu60C8j0
W+sclAaONN8GknGI=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https:
//www.scribd.com/document/255852040/GCHQ-Wiki-Open-Source-for-Cyber-Defence-Prog
ress&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover
&quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com
/img/document/255852040/fit_to_size/144x192/06a66729fc/1427743375&quot; data-src
set=&quot;https://imgv2-2-f.scribdassets.com/img/document/255852040/fit_to_size/
144x192/06a66729fc/1427743375 1x, https://imgv2-2-f.scribdassets.com/img/documen
t/255852040/fit_to_size/288x384/f1586a40ab/1427743375 2x&quot; class=&quot;lazy_
loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></d
iv><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div c
lass=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_i
con icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot
;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;
under_title&quot;>GCHQ Wiki - Open Source for Cyber Defence/Progress</div></div>
</a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&quo
t;document&quot; data-object_id=&quot;100443724&quot; data-track=&quot;trending&
quot; data-track_uuid=&quot;H/j3WtPBLolEChbZ2/NEPpKhEFQ=&quot; data-reading_prog
ress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/100443724/Under
standing-the-Invisible-Internet-Chase-Cunningham&quot; class=&quot;doc_link &quo
t;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-
src=&quot;https://imgv2-2-f.scribdassets.com/img/document/100443724/fit_to_size/
144x192/9b21a799f4/1492145609&quot; data-srcset=&quot;https://imgv2-2-f.scribdas
sets.com/img/document/100443724/fit_to_size/144x192/9b21a799f4/1492145609 1x, ht
tps://imgv2-2-f.scribdassets.com/img/document/100443724/fit_to_size/288x384/0da1
e22cd7/1492145609 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quo
t;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quo
t;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableof
contents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quo
t;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot
;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Understanding the
Invisible Internet, Chase Cunningham</div></div></a></li><li class=&quot;documen
t_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=
&quot;225427125&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;pWO2
BLeoLpE1Hgvlv3cpm9bSK5U=&quot; data-reading_progress=&quot;0&quot;><a href=&quot
;https://www.scribd.com/document/225427125/Classification-of-Malware-based-on-Da
ta-Mining-Approach&quot; class=&quot;doc_link &quot;><div class=&quot;thumb obje
ct_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.sc
ribdassets.com/img/document/225427125/fit_to_size/144x192/57576e429f/1429942867&
quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/22542712
5/fit_to_size/144x192/57576e429f/1429942867 1x, https://imgv2-1-f.scribdassets.c
om/img/document/225427125/fit_to_size/288x384/353ed67cfc/1429942867 2x&quot; cla
ss=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_ove
rlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_actio
n&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div clas
s=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quo
t;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><di
v class=&quot;under_title&quot;>Classification of Malware based on Data Mining A
pproach</div></div></a></li><li class=&quot;document_cell object_cell &quot; da
ta-object_type=&quot;document&quot; data-object_id=&quot;301984300&quot; data-tr
ack=&quot;trending&quot; data-track_uuid=&quot;r76dUkslqpMPoRxmDIg1Ifkxsf4=&quot
; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/doc/3
01984300/EFF-Amicus-Brief-in-FBI-Mass-Hacking-Case&quot; class=&quot;doc_link &q
uot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img dat
a-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/301984300/fit_to_siz
e/144x192/9f28b83288/1457025889&quot; data-srcset=&quot;https://imgv2-1-f.scribd
assets.com/img/document/301984300/fit_to_size/144x192/9f28b83288/1457025889 1x,
https://imgv2-2-f.scribdassets.com/img/document/301984300/fit_to_size/288x384/bb
68e9078b/1457025889 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&q
uot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&q
uot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_table
ofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&q
uot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&qu
ot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>EFF Amicus Brief
in FBI Mass Hacking Case</div></div></a></li><li class=&quot;document_cell obje
ct_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;59519
177&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;lNvqHK7sT0HvXuWS
2EVnKKRT2ao=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www
.scribd.com/document/59519177/Cisco-Protects-Internal-Infrastructure-from-Web-Ba
sed-Threats-Case-Study&quot; class=&quot;doc_link &quot;><div class=&quot;thumb
object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-
f.scribdassets.com/img/document/59519177/fit_to_size/144x192/b88536f135/13734277
03&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/59519
177/fit_to_size/144x192/b88536f135/1373427703 1x, https://imgv2-1-f.scribdassets
.com/img/document/59519177/fit_to_size/288x384/dc0eedfe62/1373427703 2x&quot; cl
ass=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_ov
erlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_acti
on&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div cla
ss=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&qu
ot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><d
iv class=&quot;under_title&quot;>Cisco Protects Internal Infrastructure from Web
-Based Threats (Case Study)</div></div></a></li><li class=&quot;document_cell ob
ject_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;206
888750&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;vYG6S9SiS8Kwg
nkg6dXnHXkKXIc=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://
www.scribd.com/document/206888750/Unveiling-Careto-The-Masked-APT&quot; class=&q
uot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;
&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/20688
8750/fit_to_size/144x192/0d6e196890/1402654450&quot; data-srcset=&quot;https://i
mgv2-1-f.scribdassets.com/img/document/206888750/fit_to_size/144x192/0d6e196890/
1402654450 1x, https://imgv2-1-f.scribdassets.com/img/document/206888750/fit_to_
size/288x384/95ca156ba0/1402654450 2x&quot; class=&quot;lazy_loading&quot; alt=&
quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot
;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_ico
n icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobo
ok_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div
><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>U
nveiling Careto - The Masked APT</div></div></a></li><li class=&quot;document_cell obj
ect_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;2718
40380&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;Cehex+zimh42ee
VHoX39tebmoIg=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://w
ww.scribd.com/document/271840380/Intelligence-Report-June-2015&quot; class=&quot
;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&qu
ot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/27184038
0/fit_to_size/144x192/68381680d5/1437964825&quot; data-srcset=&quot;https://imgv
2-1-f.scribdassets.com/img/document/271840380/fit_to_size/144x192/68381680d5/143
7964825 1x, https://imgv2-1-f.scribdassets.com/img/document/271840380/fit_to_siz
e/288x384/27ff744674/1437964825 2x&quot; class=&quot;lazy_loading&quot; alt=&quo
t;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;ac
tion_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon i
con-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_
play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><d
iv class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Inte
lligence Report June 2015</div></div></a></li><li class=&quot;document_cell obje
ct_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;28326
4720&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;M+MtptI+hwrkRE2
tPZX5FT5l1Aw=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://ww
w.scribd.com/doc/283264720/2015-Internet-Organised-Crime-Threat-Assessment&quot;
class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; sty
le=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/docum
ent/283264720/fit_to_size/144x192/15d2239d97/1443932195&quot; data-srcset=&quot;
https://imgv2-2-f.scribdassets.com/img/document/283264720/fit_to_size/144x192/15
d2239d97/1443932195 1x, https://imgv2-2-f.scribdassets.com/img/document/28326472
0/fit_to_size/288x384/08183fcc94/1443932195 2x&quot; class=&quot;lazy_loading&qu
ot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div cl
ass=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot
;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-i
c_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></
div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_titl
e&quot;>2015 Internet Organised Crime Threat Assessment</div></div></a></li><li
class=&quot;document_cell object_cell &quot; data-object_type=&quot;document&qu
ot; data-object_id=&quot;324253148&quot; data-track=&quot;trending&quot; data-tr
ack_uuid=&quot;B96sLGQVc/cvaoMxruPiYnoOB9Y=&quot; data-reading_progress=&quot;0&
quot;><a href=&quot;https://www.scribd.com/document/324253148/Attribution-of-Mal
icious-Cyber-Incidents-From-Soup-to-Nuts&quot; class=&quot;doc_link &quot;><div
class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quo
t;https://imgv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/144x192/
8f7f38f426/1479246094&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com
/img/document/324253148/fit_to_size/144x192/8f7f38f426/1479246094 1x, https://im
gv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/288x384/d1d93c8883/1
479246094 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div
class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div
class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents
&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div
></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_t
itle_wrapper&quot;><div class=&quot;under_title&quot;>Attribution of Malicious C
yber Incidents</div></div></a></li><li class=&quot;document_cell object_cell &q
uot; data-object_type=&quot;document&quot; data-object_id=&quot;201637336&quot;
data-track=&quot;trending&quot; data-track_uuid=&quot;EYuMkwntWNeU2ZiqDNmC7EHdt3
g=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.co
m/document/201637336/CrowdStrike-Global-Threat-Report-2013-Year-In-Review&quot;
class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; styl
e=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/docume
nt/201637336/fit_to_size/144x192/6110164f9f/1394936278&quot; data-srcset=&quot;h
ttps://imgv2-1-f.scribdassets.com/img/document/201637336/fit_to_size/144x192/611
0164f9f/1394936278 1x, https://imgv2-2-f.scribdassets.com/img/document/201637336
/fit_to_size/288x384/3ab035b135/1394936278 2x&quot; class=&quot;lazy_loading&quo
t; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div cla
ss=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;
read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic
_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></d
iv></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title
&quot;>CrowdStrike Global Threat Report</div></div></a></li><li class=&quot;docu
ment_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_
id=&quot;236784088&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;N
Sfccf4nwx2KOvxiXjPtJB5/BZ8=&quot; data-reading_progress=&quot;0&quot;><a href=&q
uot;https://www.scribd.com/document/236784088/A-Survey-of-Botnet-Detection-Techn
iques&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover
&quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.co
m/img/document/236784088/fit_to_size/144x192/d7df3f51c5/1408001732&quot; data-sr
cset=&quot;https://imgv2-1-f.scribdassets.com/img/document/236784088/fit_to_size
/144x192/d7df3f51c5/1408001732 1x, https://imgv2-1-f.scribdassets.com/img/docume
nt/236784088/fit_to_size/288x384/a82640c50b/1408001732 2x&quot; class=&quot;lazy
_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></
div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div
class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_
icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quo
t;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot
;under_title&quot;>A Survey of Botnet Detection Techniques</div></div></a></li><
li class=&quot;document_cell object_cell &quot; data-object_type=&quot;document
&quot; data-object_id=&quot;98434007&quot; data-track=&quot;trending&quot; data-
track_uuid=&quot;++7ZCmJ95bvsYirl3wzB2Yie6uY=&quot; data-reading_progress=&quot;
0&quot;><a href=&quot;https://www.scribd.com/document/98434007/High-Roller&quot;
class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; sty
le=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/docum
ent/98434007/fit_to_size/144x192/c6af145970/1406112658&quot; data-srcset=&quot;h
ttps://imgv2-1-f.scribdassets.com/img/document/98434007/fit_to_size/144x192/c6af
145970/1406112658 1x, https://imgv2-1-f.scribdassets.com/img/document/98434007/f
it_to_size/288x384/27f5ba3067/1406112658 2x&quot; class=&quot;lazy_loading&quot;
alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class
=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;re
ad_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_a
udiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div
></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&q
uot;>High Roller</div></div></a></li><li class=&quot;document_cell object_cell
&quot; data-object_type=&quot;document&quot; data-object_id=&quot;139738270&quot
; data-track=&quot;trending&quot; data-track_uuid=&quot;WjFU5cHOOS6nvaJ13WUB+b2L
oCQ=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.
com/document/139738270/Cyber-Infrastructure-Protection-Vol-II&quot; class=&quot;
doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quo
t;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/139738270
/fit_to_size/144x192/5ceb4b6197/1373744543&quot; data-srcset=&quot;https://imgv2
-2-f.scribdassets.com/img/document/139738270/fit_to_size/144x192/5ceb4b6197/1373
744543 1x, https://imgv2-2-f.scribdassets.com/img/document/139738270/fit_to_size
/288x384/311227b14a/1373744543 2x&quot; class=&quot;lazy_loading&quot; alt=&quot
;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;act
ion_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon ic
on-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_p
lay_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><di
v class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Cyber
Infrastructure Protection</div></div></a></li><li class=&quot;document_cell obj
ect_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;1931
05116&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;nIuDgGfJOFQrep
iTSAD9wCVoNRU=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://w
ww.scribd.com/document/193105116/DennisTechLabs-Anti-Virus-Report-2013-Q4-Kasper
sky-Norton-ESET-Best-Microsoft-McAfee-Worst&quot; class=&quot;doc_link &quot;><d
iv class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&
quot;https://imgv2-1-f.scribdassets.com/img/document/193105116/fit_to_size/144x1
92/664322e5b3/1412163568&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.
com/img/document/193105116/fit_to_size/144x192/664322e5b3/1412163568 1x, https:/
/imgv2-2-f.scribdassets.com/img/document/193105116/fit_to_size/288x384/6fec497de
f/1412163568 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><d
iv class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><d
iv class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofconte
nts&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></
div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;unde
r_title_wrapper&quot;><div class=&quot;under_title&quot;>DennisTechLabs Anti-Vir
us Report 2013 Q4</div></div></a></li><li class=&quot;document_cell object_cell
&quot; data-object_type=&quot;document&quot; data-object_id=&quot;248505706&quo
t; data-track=&quot;trending&quot; data-track_uuid=&quot;GiNfxhR8ZZy+cWS/VVp3pUH
q958=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd
.com/document/248505706/The-Regin-Platform-Nation-State-Ownage-of-GSM-Networks-K
aspersky-Report&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_
cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scrib
dassets.com/img/document/248505706/fit_to_size/144x192/052efe7101/1422693202&quo
t; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/248505706/f
it_to_size/144x192/052efe7101/1422693202 1x, https://imgv2-1-f.scribdassets.com/
img/document/248505706/fit_to_size/288x384/c90c6da2b9/1422693202 2x&quot; class=
&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overla
y&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&q
uot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&
quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;o
verlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div c
lass=&quot;under_title&quot;>The Regin Platform</div></div></a></li><li class=&q
uot;document_cell object_cell &quot; data-object_type=&quot;document&quot; data
-object_id=&quot;270009345&quot; data-track=&quot;trending&quot; data-track_uuid
=&quot;0sRi8NxbrjJ2joj68fdJx5Al6qY=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/270009345/FTC-Currency-Scam-Complain
t&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &qu
ot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/im
g/document/270009345/fit_to_size/144x192/e40dbf5bed/1435819008&quot; data-srcset
=&quot;https://imgv2-1-f.scribdassets.com/img/document/270009345/fit_to_size/144
x192/e40dbf5bed/1435819008 1x, https://imgv2-2-f.scribdassets.com/img/document/2
70009345/fit_to_size/288x384/beec2c9dc1/1435819008 2x&quot; class=&quot;lazy_loa
ding&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div>
<div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div clas
s=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon
icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;><
/div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;und
er_title&quot;>FTC Currency Scam Complaint</div></div></a></li><li class=&quot;d
ocument_cell object_cell &quot; data-object_type=&quot;document&quot; data-obje
ct_id=&quot;315070278&quot; data-track=&quot;trending&quot; data-track_uuid=&quo
t;VPfqHQDccpL274/vhU/QSmdL8h0=&quot; data-reading_progress=&quot;0&quot;><a href
=&quot;https://www.scribd.com/document/315070278/tmp44B8-tmp&quot; class=&quot;d
oc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot
;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/315070278/
fit_to_size/144x192/9b3cd0a9e7/1465314387&quot; data-srcset=&quot;https://imgv2-
1-f.scribdassets.com/img/document/315070278/fit_to_size/144x192/9b3cd0a9e7/14653
14387 1x, https://imgv2-2-f.scribdassets.com/img/document/315070278/fit_to_size/
288x384/d289db48a0/1465314387 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;
document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;acti
on_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon ico
n-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_pl
ay_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div
class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>tmp44B
8.tmp</div></div></a></li><li class=&quot;document_cell object_cell &quot; data
-object_type=&quot;document&quot; data-object_id=&quot;339404108&quot; data-trac
k=&quot;trending&quot; data-track_uuid=&quot;r98/IYbdlmeD2reI55zqQzreWdc=&quot;
data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/documen
t/339404108/Stein-Amended-Complaint&quot; class=&quot;doc_link &quot;><div class
=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;htt
ps://imgv2-2-f.scribdassets.com/img/document/339404108/fit_to_size/144x192/98441
6b7a5/1487175975&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/
document/339404108/fit_to_size/144x192/984416b7a5/1487175975 1x, https://imgv2-1
-f.scribdassets.com/img/document/339404108/fit_to_size/288x384/284aefcf8c/148717
5975 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class
=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class
=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot
;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></di
v><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_
wrapper&quot;><div class=&quot;under_title&quot;>Stein Amended Complaint</div></
div></a></li><li class=&quot;document_cell object_cell &quot; data-object_type=
&quot;document&quot; data-object_id=&quot;56571913&quot; data-track=&quot;trendi
ng&quot; data-track_uuid=&quot;bAizVkelIpXf+vy3eq0jkqbZpp0=&quot; data-reading_p
rogress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/56571913/Go-
Lackawanna-05-29-2011&quot; class=&quot;doc_link &quot;><div class=&quot;thumb o
bject_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f
.scribdassets.com/img/document/56571913/fit_to_size/144x192/0d0f93c922/135983446
0&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/565719
13/fit_to_size/144x192/0d0f93c922/1359834460 1x, https://imgv2-1-f.scribdassets.
com/img/document/56571913/fit_to_size/288x384/178083b9a2/1359834460 2x&quot; cla
ss=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_ove
rlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_actio
n&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div clas
s=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quo
t;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><di
v class=&quot;under_title&quot;>Go Lackawanna 05-29-2011</div></div></a></li><li
class=&quot;document_cell object_cell &quot; data-object_type=&quot;document&q
uot; data-object_id=&quot;72931617&quot; data-track=&quot;trending&quot; data-tr
ack_uuid=&quot;aYy4hGBwfE9RZiXBYIFOazevVWw=&quot; data-reading_progress=&quot;0&
quot;><a href=&quot;https://www.scribd.com/document/72931617/Excerpt-Worm-The-Fi
rst-Digital-World-War-by-Mark-Bowden&quot; class=&quot;doc_link &quot;><div clas
s=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;ht
tps://imgv2-2-f.scribdassets.com/img/document/72931617/fit_to_size/144x192/1c72f
963bf/1321466145&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/
document/72931617/fit_to_size/144x192/1c72f963bf/1321466145 1x, https://imgv2-1-
f.scribdassets.com/img/document/72931617/fit_to_size/288x384/7563e1bafe/13214661
45 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&
quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&
quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;>
</div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div>
<div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wr
apper&quot;><div class=&quot;under_title&quot;>Excerpt</div></div></a></li><li c
lass=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quo
t; data-object_id=&quot;78075012&quot; data-track=&quot;trending&quot; data-trac
k_uuid=&quot;CMTQxuYD2hWHYlKaKvuzbvwHcZA=&quot; data-reading_progress=&quot;0&qu
ot;><a href=&quot;https://www.scribd.com/document/78075012/Visualizing-Compiled-
Executables-for-Malware-Analysis&quot; class=&quot;doc_link &quot;><div class=&q
uot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https:
//imgv2-1-f.scribdassets.com/img/document/78075012/fit_to_size/144x192/39ebac4a7
5/1433883292&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/docu
ment/78075012/fit_to_size/144x192/39ebac4a75/1433883292 1x, https://imgv2-1-f.sc
ribdassets.com/img/document/78075012/fit_to_size/288x384/0fb20364d7/1433883292 2
x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot
;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot
;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></di
v><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div
class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrappe
r&quot;><div class=&quot;under_title&quot;>Visualizing Compiled Executables for
Malware Analysis</div></div></a></li><li class=&quot;document_cell object_cell
&quot; data-object_type=&quot;document&quot; data-object_id=&quot;179908610&quot
; data-track=&quot;trending&quot; data-track_uuid=&quot;VNsZsKpHQQNWnnqJTSLnypI2
bD0=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.
com/document/179908610/NQ-Responds-To-Muddy-Waters-pdf&quot; class=&quot;doc_lin
k &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img
data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/179908610/fit_to
_size/144x192/f72411df76/1413259105&quot; data-srcset=&quot;https://imgv2-1-f.sc
ribdassets.com/img/document/179908610/fit_to_size/144x192/f72411df76/1413259105
1x, https://imgv2-2-f.scribdassets.com/img/document/179908610/fit_to_size/288x38
4/59b9c0040e/1413259105 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;docume
nt&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_lay
er&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_t
ableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_lar
ge&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class
=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>NQ Responds
To Muddy Waters.pdf</div></div></a></li><li class=&quot;document_cell object_cel
l &quot; data-object_type=&quot;document&quot; data-object_id=&quot;191911540&q
uot; data-track=&quot;trending&quot; data-track_uuid=&quot;Dmv6PbQCYE1lPntD33TJO
StZG50=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scri
bd.com/document/191911540/Finjan-v-Proofpoint-et-al&quot; class=&quot;doc_link &
quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img da
ta-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/191911540/fit_to_si
ze/144x192/902efb249d/1394418218&quot; data-srcset=&quot;https://imgv2-2-f.scrib
dassets.com/img/document/191911540/fit_to_size/144x192/902efb249d/1394418218 1x,
https://imgv2-1-f.scribdassets.com/img/document/191911540/fit_to_size/288x384/e
3593f82b7/1394418218 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&
quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&
quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tabl
eofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&
quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&q
uot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>Finjan v. Proof
point et. al.</div></div></a></li><li class=&quot;document_cell object_cell &qu
ot; data-object_type=&quot;document&quot; data-object_id=&quot;204556894&quot; d
ata-track=&quot;trending&quot; data-track_uuid=&quot;9mGjjBuCKh9FoBUSq8TSqmqYLbM
=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com
/document/204556894/FBI-Seeking-to-Purchase-35GB-of-Malware-Per-Day&quot; class=
&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quo
t;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/204
556894/fit_to_size/144x192/644db9204b/1423066290&quot; data-srcset=&quot;https:/
/imgv2-1-f.scribdassets.com/img/document/204556894/fit_to_size/144x192/644db9204
b/1423066290 1x, https://imgv2-1-f.scribdassets.com/img/document/204556894/fit_t
o_size/288x384/e32e75ae2d/1423066290 2x&quot; class=&quot;lazy_loading&quot; alt
=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&qu
ot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_i
con icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audio
book_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></d
iv><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;
>FBI Seeking to Purchase 35GB of Malware Per Day</div></div></a></li></ul></div>
</div><div><img src=&quot;https://s2-f.scribdassets.com/images/home/logged_in/ic
_home_control_left_arrow.png?1494885498&quot; alt=&quot;carousel previous&quot;
class=&quot;paddle page_left carousel_prev&quot; data-track=&quot;carousel:previ
ous&quot; aria-hidden=&quot;true&quot;><img src=&quot;https://s1-f.scribdassets.
com/images/home/logged_in/ic_home_control_right_arrow.png?1494885498&quot; alt=&
quot;carousel next&quot; class=&quot;paddle page_right carousel_next&quot; data-
track=&quot;carousel:next&quot; aria-hidden=&quot;true&quot;></div></div><div cl
ass=&quot;carousel_scrollbar&quot;><div class=&quot;carousel_scrollbar_thumb&quo
t;></div></div></div></div><script type=&quot;text/javascript&quot;>
//<![CDATA[
new Scribd.UI.Carousel(&quot;#autogen_id_503789742&quot;, {&quot;page&quot
;:false,&quot;compilation_id&quot;:&quot;8IbulvcG1Nw2brzpWJNQBdys3lg=&quot;,&quo
t;module_id&quot;:&quot;DptMFYFLDvkwurl9Bk6M50UHswg=&quot;,&quot;widget_name&quo
t;:&quot;document_carousel:footer&quot;,&quot;sub_module&quot;:false})

//]]>
</script><div class=&quot;autogen_class_views_discover_modules_carousel document
_carousel module_row autogen_class_views_shared_carousels_carousel autogen_class
_widgets_base has_paddles has_document_cells carousel_widget show_title document
_carousel regular_doc_thumb_width&quot; id=&quot;autogen_id_503795426&quot; data
-lazy_images=&quot;true&quot;><div class=&quot;carousel_wrap&quot;><h3 class=&qu
ot;carousel_title&quot; data-track=&quot;trending&quot;><a class=&quot;title_lin
k&quot; href=&quot;https://www.scribd.com/interest/Computer-Security/docs&quot;
data-track data-track_rats=&quot;mc&quot; data-track_uuid=&quot;eabG2pQt6DwIXCMs
d6CQ3DOfnEg=&quot;>Documents About Computer Security</a></h3><a href=&quot;#skip
_carousel&quot; class=&quot;carousel_skip_link&quot;>Skip carousel</a><div class
=&quot;carousel_outer&quot;><div class=&quot;carousel&quot;><div class=&quot;car
ousel_scrolling&quot;><ul class=&quot;autogen_class_views_shared_carousels_docum
ent_cells autogen_class_widgets_base&quot; id=&quot;autogen_id_503794065&quot;><
li class=&quot;document_cell object_cell &quot; data-object_type=&quot;document
&quot; data-object_id=&quot;333290070&quot; data-track=&quot;trending&quot; data
-track_uuid=&quot;/AuF2+1gNYqqAoG3PKuJokTYxKM=&quot; data-reading_progress=&quot
;0&quot;><a href=&quot;https://www.scribd.com/document/333290070/FCC-Response-12
-05-2016&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_ho
ver &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets
.com/img/document/333290070/fit_to_size/144x192/69d637aa4c/1481169383&quot; data
-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/333290070/fit_to_s
ize/144x192/69d637aa4c/1481169383 1x, https://imgv2-2-f.scribdassets.com/img/doc
ument/333290070/fit_to_size/288x384/a0455f902e/1481169383 2x&quot; class=&quot;l
azy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;
></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><d
iv class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pl
ay_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&
quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&q
uot;under_title&quot;>FCC Response 12-05-2016</div></div></a></li><li class=&quo
t;document_cell object_cell &quot; data-object_type=&quot;document&quot; data-o
bject_id=&quot;290177134&quot; data-track=&quot;trending&quot; data-track_uuid=&
quot;5FUQRU4PLaLojxyY+FeR8vTlKIs=&quot; data-reading_progress=&quot;0&quot;><a h
ref=&quot;https://www.scribd.com/doc/290177134/IS-Encryption-Guide&quot; class=&
quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot
;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/2901
77134/fit_to_size/144x192/5a7990f2be/1451534045&quot; data-srcset=&quot;https://
imgv2-2-f.scribdassets.com/img/document/290177134/fit_to_size/144x192/5a7990f2be
/1451534045 1x, https://imgv2-2-f.scribdassets.com/img/document/290177134/fit_to
_size/288x384/07ddeafa46/1451534045 2x&quot; class=&quot;lazy_loading&quot; alt=
&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quo
t;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_ic
on icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiob
ook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></di
v><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>
IS Encryption Guide</div></div></a></li><li class=&quot;document_cell object_cel
l &quot; data-object_type=&quot;document&quot; data-object_id=&quot;28994827&qu
ot; data-track=&quot;trending&quot; data-track_uuid=&quot;VphbWCLYJtRhssc8f/WydX
m8Oo8=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scrib
d.com/document/28994827/USA-TODAY-Collegiate-Case-Study-Cybercrime&quot; class=&
quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot
;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/2899
4827/fit_to_size/144x192/1ae91f7cbd/1358918063&quot; data-srcset=&quot;https://i
mgv2-1-f.scribdassets.com/img/document/28994827/fit_to_size/144x192/1ae91f7cbd/1
358918063 1x, https://imgv2-2-f.scribdassets.com/img/document/28994827/fit_to_si
ze/288x384/47d58082b8/1358918063 2x&quot; class=&quot;lazy_loading&quot; alt=&qu
ot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;a
ction_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon
icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook
_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><
div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>USA
TODAY Collegiate Case Study</div></div></a></li><li class=&quot;document_cell o
bject_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;25
9315223&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;xswV2NHjeSUZ
i9bAlzPG0NaVFSQ=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https:/
/www.scribd.com/document/259315223/CISA-bill-text-with-OTI-redlines&quot; class=
&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quo
t;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/259
315223/fit_to_size/144x192/4b20e4ecf1/1429782142&quot; data-srcset=&quot;https:/
/imgv2-1-f.scribdassets.com/img/document/259315223/fit_to_size/144x192/4b20e4ecf
1/1429782142 1x, https://imgv2-1-f.scribdassets.com/img/document/259315223/fit_t
o_size/288x384/2fae31d874/1429782142 2x&quot; class=&quot;lazy_loading&quot; alt
=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&qu
ot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_i
con icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audio
book_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></d
iv><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;
>CISA bill text with OTI redlines</div></div></a></li><li class=&quot;document_c
ell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&qu
ot;91268009&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;800SnXdh
8e/PAvC/Nm6fIX13yow=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;htt
ps://www.scribd.com/document/91268009/White-House-issues-statement-against-CISPA
&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quo
t; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img
/document/91268009/fit_to_size/144x192/270eab7761/1335384747&quot; data-srcset=&
quot;https://imgv2-1-f.scribdassets.com/img/document/91268009/fit_to_size/144x19
2/270eab7761/1335384747 1x, https://imgv2-1-f.scribdassets.com/img/document/9126
8009/fit_to_size/288x384/94d819b13a/1335384747 2x&quot; class=&quot;lazy_loading
&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div
class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&q
uot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon ico
n-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div
></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_t
itle&quot;>White House issues statement against CISPA</div></div></a></li><li cl
ass=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot
; data-object_id=&quot;186380907&quot; data-track=&quot;trending&quot; data-trac
k_uuid=&quot;2lZ/tevHrvYnk+srSM3OmkkYcKM=&quot; data-reading_progress=&quot;0&qu
ot;><a href=&quot;https://www.scribd.com/document/186380907/BILLS-113s1353is&quo
t; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; s
tyle=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/doc
ument/186380907/fit_to_size/144x192/25e0951eb1/1390663030&quot; data-srcset=&quo
t;https://imgv2-2-f.scribdassets.com/img/document/186380907/fit_to_size/144x192/
25e0951eb1/1390663030 1x, https://imgv2-1-f.scribdassets.com/img/document/186380
907/fit_to_size/288x384/81cdbd0c87/1390663030 2x&quot; class=&quot;lazy_loading&
quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div
class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&qu
ot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon
-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div>
</div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_ti
tle&quot;>BILLS-113s1353is</div></div></a></li><li class=&quot;document_cell obj
ect_cell &quot; data-object_type=&quot;document&quot; data-object_id=&quot;3335
36875&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;paLySnFzTBqBDg
rNPXxpfoL2GbA=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://w
ww.scribd.com/document/333536875/2017-Global-State-of-Information-Security-Surve
y&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &qu
ot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/im
g/document/333536875/fit_to_size/144x192/b16627d7eb/1481131244&quot; data-srcset
=&quot;https://imgv2-2-f.scribdassets.com/img/document/333536875/fit_to_size/144
x192/b16627d7eb/1481131244 1x, https://imgv2-1-f.scribdassets.com/img/document/3
33536875/fit_to_size/288x384/a272283c31/1481131244 2x&quot; class=&quot;lazy_loa
ding&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div>
<div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div clas
s=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon
icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;><
/div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;und
er_title&quot;>2017 Global State of Information Security Survey</div></div></a><
/li><li class=&quot;document_cell object_cell &quot; data-object_type=&quot;doc
ument&quot; data-object_id=&quot;286056862&quot; data-track=&quot;trending&quot;
data-track_uuid=&quot;YiVgxrPZNA6F/FoJuNQqtgfQk2s=&quot; data-reading_progress=
&quot;0&quot;><a href=&quot;https://www.scribd.com/document/286056862/2016-Globa
l-State-of-Information-Security-Survey-Sample-Slides&quot; class=&quot;doc_link
&quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img d
ata-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/286056862/fit_to_s
ize/144x192/06a569ce69/1465847419&quot; data-srcset=&quot;https://imgv2-2-f.scri
bdassets.com/img/document/286056862/fit_to_size/144x192/06a569ce69/1465847419 1x
, https://imgv2-2-f.scribdassets.com/img/document/286056862/fit_to_size/288x384/
6edda37d1a/1465847419 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document
&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer
&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tab
leofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large
&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&
quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>2016 Global St
ate of Information Security Survey Sample Slides</div></div></a></li><li class=&
quot;document_cell object_cell &quot; data-object_type=&quot;document&quot; dat
a-object_id=&quot;337089962&quot; data-track=&quot;trending&quot; data-track_uui
d=&quot;M7QXvP5lCh6pSz8WxnIGAy2F9zY=&quot; data-reading_progress=&quot;0&quot;><
a href=&quot;https://www.scribd.com/document/337089962/WP2016-3-1-4-Blockchain-S
ecurity&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hov
er &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.
com/img/document/337089962/fit_to_size/144x192/31648c7657/1489563998&quot; data-
srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/337089962/fit_to_si
ze/144x192/31648c7657/1489563998 1x, https://imgv2-1-f.scribdassets.com/img/docu
ment/337089962/fit_to_size/288x384/00e386527f/1489563998 2x&quot; class=&quot;la
zy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;>
</div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><di
v class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pla
y_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&q
uot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&qu
ot;under_title&quot;>WP2016 3-1 4 Blockchain Security</div></div></a></li><li cl
ass=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot
; data-object_id=&quot;256961616&quot; data-track=&quot;trending&quot; data-trac
k_uuid=&quot;PUNlLHujYlxkF180ZtyntBGLxGw=&quot; data-reading_progress=&quot;0&qu
ot;><a href=&quot;https://www.scribd.com/document/256961616/CSE-Response-to-CBC-
Re-PONY-EXPRESS&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_
cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scrib
dassets.com/img/document/256961616/fit_to_size/144x192/0852386abc/1425673476&quo
t; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/256961616/f
it_to_size/144x192/0852386abc/1425673476 1x, https://imgv2-1-f.scribdassets.com/
img/document/256961616/fit_to_size/288x384/96a99ae88e/1425673476 2x&quot; class=
&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overla
y&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&q
uot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&
quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;o
verlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div c
lass=&quot;under_title&quot;>CSE Response to CBC Re</div></div></a></li><li clas
s=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot;
data-object_id=&quot;332578388&quot; data-track=&quot;trending&quot; data-track_
uuid=&quot;ZyFIOsXwoy6+i5IHys+daR47Aa4=&quot; data-reading_progress=&quot;0&quot
;><a href=&quot;https://www.scribd.com/document/332578388/China-Encryption-Polic
y-and-International-Influence&quot; class=&quot;doc_link &quot;><div class=&quot
;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://i
mgv2-1-f.scribdassets.com/img/document/332578388/fit_to_size/144x192/259bb04219/
1481575399&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/docume
nt/332578388/fit_to_size/144x192/259bb04219/1481575399 1x, https://imgv2-2-f.scr
ibdassets.com/img/document/332578388/fit_to_size/288x384/9eb5cf47ac/1481575399 2
x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot
;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot
;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></di
v><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div
class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrappe
r&quot;><div class=&quot;under_title&quot;>China, Encryption Policy, and Interna
tional Influence</div></div></a></li><li class=&quot;document_cell object_cell
&quot; data-object_type=&quot;document&quot; data-object_id=&quot;321669470&quot
; data-track=&quot;trending&quot; data-track_uuid=&quot;ca2oaUWxE03OF0fKeW9h7N4w
hDo=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.
com/document/321669470/HOUSE-HEARING-113TH-CONGRESS-PROTECTING-YOUR-PERSONAL-DAT
A-HOW-LAW-ENFORCEMENT-WORKS-WITH-THE-PRIVATE-SECTOR-TO-PREVENT-CYBERCRIME&quot;
class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; styl
e=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/docume
nt/321669470/fit_to_size/144x192/4540ab46d8/1471608099&quot; data-srcset=&quot;h
ttps://imgv2-1-f.scribdassets.com/img/document/321669470/fit_to_size/144x192/454
0ab46d8/1471608099 1x, https://imgv2-1-f.scribdassets.com/img/document/321669470
/fit_to_size/288x384/d6804491b5/1471608099 2x&quot; class=&quot;lazy_loading&quo
t; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div cla
ss=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;
read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic
_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></d
iv></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title
&quot;>HOUSE HEARING, 113TH CONGRESS - PROTECTING YOUR PERSONAL DATA</div></div>
</a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&quo
t;document&quot; data-object_id=&quot;328759298&quot; data-track=&quot;trending&
quot; data-track_uuid=&quot;CAog0E8OGUdBzTkoGGaAIPNeT4U=&quot; data-reading_prog
ress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/328759298/NHTSA
-Cybersecurity-Best-Practices-for-Modern-Vehicles&quot; class=&quot;doc_link &qu
ot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data
-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/328759298/fit_to_size
/144x192/73533d5d07/1492276630&quot; data-srcset=&quot;https://imgv2-2-f.scribda
ssets.com/img/document/328759298/fit_to_size/144x192/73533d5d07/1492276630 1x, h
ttps://imgv2-2-f.scribdassets.com/img/document/328759298/fit_to_size/288x384/88c
2aece68/1492276630 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&qu
ot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&qu
ot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableo
fcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&qu
ot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quo
t;under_title_wrapper&quot;><div class=&quot;under_title&quot;>NHTSA Cybersecuri
ty Best Practices for Modern Vehicles</div></div></a></li><li class=&quot;docume
nt_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id
=&quot;336627464&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;T8X
qztK2aXondh7CeGxbjNv39M4=&quot; data-reading_progress=&quot;0&quot;><a href=&quo
t;https://www.scribd.com/document/336627464/A-Framework-for-FinTech-National-Eco
nomic-Council-January-2017-White-House&quot; class=&quot;doc_link &quot;><div cl
ass=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;
https://imgv2-1-f.scribdassets.com/img/document/336627464/fit_to_size/144x192/eb
813e3cb6/1492276107&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/i
mg/document/336627464/fit_to_size/144x192/eb813e3cb6/1492276107 1x, https://imgv
2-2-f.scribdassets.com/img/document/336627464/fit_to_size/288x384/4da05109a6/149
2276107 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div cl
ass=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div cl
ass=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&q
uot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div><
/div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_tit
le_wrapper&quot;><div class=&quot;under_title&quot;>A Framework for FinTech Nati
onal Economic Council January 2017 White House</div></div></a></li><li class=&qu
ot;document_cell object_cell &quot; data-object_type=&quot;document&quot; data-
object_id=&quot;296097632&quot; data-track=&quot;trending&quot; data-track_uuid=
&quot;+/hlW1r5VQChFZSbblenn1KVkTg=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/doc/296097632/The-Best-Security-Defense-A-Good
-Offense&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_ho
ver &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets
.com/img/document/296097632/fit_to_size/144x192/547e04a02b/1465935087&quot; data
-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/296097632/fit_to_s
ize/144x192/547e04a02b/1465935087 1x, https://imgv2-1-f.scribdassets.com/img/doc
ument/296097632/fit_to_size/288x384/1b497042c7/1465935087 2x&quot; class=&quot;l
azy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;
></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><d
iv class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pl
ay_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&
quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&q
uot;under_title&quot;>The Best Security Defense? A Good Offense</div></div></a><
/li><li class=&quot;document_cell object_cell &quot; data-object_type=&quot;doc
ument&quot; data-object_id=&quot;332714474&quot; data-track=&quot;trending&quot;
data-track_uuid=&quot;soL2RQ+D/EqOQnWnLaGPUFsiUTE=&quot; data-reading_progress=
&quot;0&quot;><a href=&quot;https://www.scribd.com/document/332714474/WikiLeaks-
Response-v5&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell
_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.scribdass
ets.com/img/document/332714474/fit_to_size/144x192/19bba6f3c8/1480732042&quot; d
ata-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/332714474/fit_t
o_size/144x192/19bba6f3c8/1480732042 1x, https://imgv2-1-f.scribdassets.com/img/
document/332714474/fit_to_size/288x384/70d9a9cea5/1480732042 2x&quot; class=&quo
t;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&qu
ot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;
><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot
;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overl
ay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class
=&quot;under_title&quot;>WikiLeaks Response v5</div></div></a></li><li class=&qu
ot;document_cell object_cell &quot; data-object_type=&quot;document&quot; data-
object_id=&quot;306290051&quot; data-track=&quot;trending&quot; data-track_uuid=
&quot;Cqtk5dPvMFSCtBl0iEDdSzrK8iE=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/306290051/How-Our-Unhealthy-Cybersecu
rity-Infrastructure-is-Hurting-Biotechnology&quot; class=&quot;doc_link &quot;><
div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=
&quot;https://imgv2-2-f.scribdassets.com/img/document/306290051/fit_to_size/144x
192/e9eb441ada/1459269219&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets
.com/img/document/306290051/fit_to_size/144x192/e9eb441ada/1459269219 1x, https:
//imgv2-2-f.scribdassets.com/img/document/306290051/fit_to_size/288x384/0f01319b
1c/1459269219 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><
div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><
div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcont
ents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;><
/div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;und
er_title_wrapper&quot;><div class=&quot;under_title&quot;>How Our Unhealthy Cybe
rsecurity Infrastructure is Hurting Biotechnology</div></div></a></li><li class=
&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot; da
ta-object_id=&quot;257104389&quot; data-track=&quot;trending&quot; data-track_uu
id=&quot;KmIjHOBjqForluQayKRwj2b5yS0=&quot; data-reading_progress=&quot;0&quot;>
<a href=&quot;https://www.scribd.com/document/257104389/IARPA-Cyber-Attack-Autom
ated-Unconventional-Sensor-Environment-CAUSE&quot; class=&quot;doc_link &quot;><
div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=
&quot;https://imgv2-2-f.scribdassets.com/img/document/257104389/fit_to_size/144x
192/8d5f5ac0de/1425420240&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets
.com/img/document/257104389/fit_to_size/144x192/8d5f5ac0de/1425420240 1x, https:
//imgv2-1-f.scribdassets.com/img/document/257104389/fit_to_size/288x384/112d2a53
6b/1425420240 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><
div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><
div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcont
ents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;><
/div></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;und
er_title_wrapper&quot;><div class=&quot;under_title&quot;>IARPA Cyber-Attack Aut
omated Unconventional Sensor Environment (CAUSE)</div></div></a></li><li class=&
quot;document_cell object_cell &quot; data-object_type=&quot;document&quot; dat
a-object_id=&quot;266842667&quot; data-track=&quot;trending&quot; data-track_uui
d=&quot;TKFLSUNEczKky6SazJZb8SxFwEI=&quot; data-reading_progress=&quot;0&quot;><
a href=&quot;https://www.scribd.com/doc/266842667/NJ-Digital-Currency-Jobs-Creat
ion-Act&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hov
er &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.
com/img/document/266842667/fit_to_size/144x192/5db9c1773c/1452273720&quot; data-
srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/266842667/fit_to_si
ze/144x192/5db9c1773c/1452273720 1x, https://imgv2-2-f.scribdassets.com/img/docu
ment/266842667/fit_to_size/288x384/2321fa311c/1452273720 2x&quot; class=&quot;la
zy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;>
</div><div class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><di
v class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;pla
y_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&q
uot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div class=&qu
ot;under_title&quot;>NJ Digital Currency Jobs Creation Act</div></div></a></li><
li class=&quot;document_cell object_cell &quot; data-object_type=&quot;document
&quot; data-object_id=&quot;337105377&quot; data-track=&quot;trending&quot; data
-track_uuid=&quot;rgUjeBg32OaeHo1Qf0X61nJc+IQ=&quot; data-reading_progress=&quot
;0&quot;><a href=&quot;https://www.scribd.com/document/337105377/FINRA-Blockchai
n-Report-2017-January&quot; class=&quot;doc_link &quot;><div class=&quot;thumb o
bject_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f
.scribdassets.com/img/document/337105377/fit_to_size/144x192/72eddd4366/14849382
44&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/33710
5377/fit_to_size/144x192/72eddd4366/1484938244 1x, https://imgv2-1-f.scribdasset
s.com/img/document/337105377/fit_to_size/288x384/4fbb3d0905/1484938244 2x&quot;
class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_
overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_ac
tion&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div c
lass=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&
quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;>
<div class=&quot;under_title&quot;>FINRA Blockchain Report 2017 January</div></d
iv></a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&
quot;document&quot; data-object_id=&quot;298833616&quot; data-track=&quot;trendi
ng&quot; data-track_uuid=&quot;BpeumH/1CK/cSP/+47A1opzBh2M=&quot; data-reading_p
rogress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/298833616/Th
e-importance-of-Big-Data-analytics-in-the-field-of-Cyber-Security&quot; class=&q
uot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;
&quot;><img data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/29883
3616/fit_to_size/144x192/11907dca29/1455093231&quot; data-srcset=&quot;https://i
mgv2-2-f.scribdassets.com/img/document/298833616/fit_to_size/144x192/11907dca29/
1455093231 1x, https://imgv2-2-f.scribdassets.com/img/document/298833616/fit_to_
size/288x384/71d5175897/1455093231 2x&quot; class=&quot;lazy_loading&quot; alt=&
quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot
;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_ico
n icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobo
ok_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></div
><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>T
he importance of Big Data analytics in the field of Cyber Security</div></div></
a></li><li class=&quot;document_cell object_cell &quot; data-object_type=&quot;
document&quot; data-object_id=&quot;310936704&quot; data-track=&quot;trending&qu
ot; data-track_uuid=&quot;hFV9Po+5NDZWXAZFbd7PO2YR/40=&quot; data-reading_progre
ss=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/310936704/U-S-Chi
na-Cybersecurity-Cooperation-Needs-to-Move-More-Rapidly&quot; class=&quot;doc_li
nk &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><im
g data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/310936704/fit_t
o_size/144x192/73032ac751/1461946188&quot; data-srcset=&quot;https://imgv2-2-f.s
cribdassets.com/img/document/310936704/fit_to_size/144x192/73032ac751/1461946188
1x, https://imgv2-1-f.scribdassets.com/img/document/310936704/fit_to_size/288x3
84/b8895f923c/1461946188 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;docum
ent&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_la
yer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_
tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_la
rge&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div clas
s=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>U.S.-China
Cybersecurity Cooperation Needs to Move More Rapidly</div></div></a></li><li cla
ss=&quot;document_cell object_cell &quot; data-object_type=&quot;document&quot;
data-object_id=&quot;316482163&quot; data-track=&quot;trending&quot; data-track
_uuid=&quot;R05fE2AQjYKszC4J8eoo7f5iXYg=&quot; data-reading_progress=&quot;0&quo
t;><a href=&quot;https://www.scribd.com/doc/316482163/Hacking-Back-Without-Crack
ing-Up-by-Jeremy-Rabkin-and-Ariel-Rabkin&quot; class=&quot;doc_link &quot;><div
class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quo
t;https://imgv2-1-f.scribdassets.com/img/document/316482163/fit_to_size/144x192/
698d4e4163/1479245863&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com
/img/document/316482163/fit_to_size/144x192/698d4e4163/1479245863 1x, https://im
gv2-2-f.scribdassets.com/img/document/316482163/fit_to_size/288x384/28b50d44b1/1
479245863 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div
class=&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div
class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents
&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div
></div><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_t
itle_wrapper&quot;><div class=&quot;under_title&quot;>Hacking Back Without Crack
ing Up, by Jeremy Rabkin and Ariel Rabkin</div></div></a></li><li class=&quot;do
cument_cell object_cell &quot; data-object_type=&quot;document&quot; data-objec
t_id=&quot;322903766&quot; data-track=&quot;trending&quot; data-track_uuid=&quot
;oz+H8AUp3tf6YGj9KezBMtQ5jB0=&quot; data-reading_progress=&quot;0&quot;><a href=
&quot;https://www.scribd.com/document/322903766/SENATE-HEARING-113TH-CONGRESS-TH
E-CYBERSECURITY-PARTNERSHIP-BETWEEN-THE-PRIVATE-SECTOR-AND-OUR-GOVERNMENT-PROTEC
TING-OUR-NATIONAL-AND-ECONOMIC-SEC&quot; class=&quot;doc_link &quot;><div class=
&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;http
s://imgv2-2-f.scribdassets.com/img/document/322903766/fit_to_size/144x192/6a4405
a09f/1474334130&quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/d
ocument/322903766/fit_to_size/144x192/6a4405a09f/1474334130 1x, https://imgv2-2-
f.scribdassets.com/img/document/322903766/fit_to_size/288x384/71d327a134/1474334
130 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=
&quot;shadow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=
&quot;main_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;
></div><div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div
><div class=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_w
rapper&quot;><div class=&quot;under_title&quot;>SENATE HEARING, 113TH CONGRESS -
THE CYBERSECURITY PARTNERSHIP BETWEEN THE PRIVATE SECTOR AND OUR GOVERNMENT</di
v></div></a></li><li class=&quot;document_cell object_cell &quot; data-object_t
ype=&quot;document&quot; data-object_id=&quot;336965171&quot; data-track=&quot;t
rending&quot; data-track_uuid=&quot;2EJDzy2UnyIiWwnQeklFHI1KHSY=&quot; data-read
ing_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/3369651
71/Mozilla-IHR-v01&quot; class=&quot;doc_link &quot;><div class=&quot;thumb obje
ct_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-2-f.sc
ribdassets.com/img/document/336965171/fit_to_size/144x192/cc67de39b3/1485295625&
quot; data-srcset=&quot;https://imgv2-2-f.scribdassets.com/img/document/33696517
1/fit_to_size/144x192/cc67de39b3/1485295625 1x, https://imgv2-2-f.scribdassets.c
om/img/document/336965171/fit_to_size/288x384/91b21f42ac/1485295625 2x&quot; cla
ss=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_ove
rlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_actio
n&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div clas
s=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quo
t;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><di
v class=&quot;under_title&quot;>Mozilla IHR v01</div></div></a></li><li class=&q
uot;document_cell object_cell &quot; data-object_type=&quot;document&quot; data
-object_id=&quot;337566927&quot; data-track=&quot;trending&quot; data-track_uuid
=&quot;apQ36BWlYb4+RzzbitsXtoQvFhY=&quot; data-reading_progress=&quot;0&quot;><a
href=&quot;https://www.scribd.com/document/337566927/Letter-From-Jeh-Johnson&qu
ot; class=&quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot;
style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/do
cument/337566927/fit_to_size/144x192/39d52977da/1485386667&quot; data-srcset=&qu
ot;https://imgv2-1-f.scribdassets.com/img/document/337566927/fit_to_size/144x192
/39d52977da/1485386667 1x, https://imgv2-1-f.scribdassets.com/img/document/33756
6927/fit_to_size/288x384/501c40b435/1485386667 2x&quot; class=&quot;lazy_loading
&quot; alt=&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div
class=&quot;action_layer&quot;><div class=&quot;main_action&quot;><div class=&q
uot;read_icon icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon ico
n-ic_audiobook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div
></div></div><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_t
itle&quot;>Letter From Jeh Johnson</div></div></a></li><li class=&quot;document_
cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=&q
uot;261374478&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;5l7n58
w9IYysqYGow55A7cvYW+s=&quot; data-reading_progress=&quot;0&quot;><a href=&quot;h
ttps://www.scribd.com/document/261374478/McCarthy-Memo&quot; class=&quot;doc_lin
k &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot;&quot;><img
data-src=&quot;https://imgv2-2-f.scribdassets.com/img/document/261374478/fit_to
_size/144x192/37db98732f/1428933086&quot; data-srcset=&quot;https://imgv2-2-f.sc
ribdassets.com/img/document/261374478/fit_to_size/144x192/37db98732f/1428933086
1x, https://imgv2-1-f.scribdassets.com/img/document/261374478/fit_to_size/288x38
4/c3f236cfb1/1428933086 2x&quot; class=&quot;lazy_loading&quot; alt=&quot;docume
nt&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quot;action_lay
er&quot;><div class=&quot;main_action&quot;><div class=&quot;read_icon icon-ic_t
ableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiobook_play_lar
ge&quot;></div></div><div class=&quot;overlay&quot;></div></div></div><div class
=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>McCarthy Mem
o</div></div></a></li><li class=&quot;document_cell object_cell &quot; data-obj
ect_type=&quot;document&quot; data-object_id=&quot;324253148&quot; data-track=&q
uot;trending&quot; data-track_uuid=&quot;QdrhZv4SvnW9yQrmFWYfXNDBaWI=&quot; data
-reading_progress=&quot;0&quot;><a href=&quot;https://www.scribd.com/document/32
4253148/Attribution-of-Malicious-Cyber-Incidents-From-Soup-to-Nuts&quot; class=&
quot;doc_link &quot;><div class=&quot;thumb object_cell_hover &quot; style=&quot
;&quot;><img data-src=&quot;https://imgv2-1-f.scribdassets.com/img/document/3242
53148/fit_to_size/144x192/8f7f38f426/1479246094&quot; data-srcset=&quot;https://
imgv2-1-f.scribdassets.com/img/document/324253148/fit_to_size/144x192/8f7f38f426
/1479246094 1x, https://imgv2-1-f.scribdassets.com/img/document/324253148/fit_to
_size/288x384/d1d93c8883/1479246094 2x&quot; class=&quot;lazy_loading&quot; alt=
&quot;document&quot;><div class=&quot;shadow_overlay&quot;></div><div class=&quo
t;action_layer&quot;><div class=&quot;main_action&quot;><div class=&quot;read_ic
on icon-ic_tableofcontents&quot;></div><div class=&quot;play_icon icon-ic_audiob
ook_play_large&quot;></div></div><div class=&quot;overlay&quot;></div></div></di
v><div class=&quot;under_title_wrapper&quot;><div class=&quot;under_title&quot;>
Attribution of Malicious Cyber Incidents</div></div></a></li><li class=&quot;doc
ument_cell object_cell &quot; data-object_type=&quot;document&quot; data-object
_id=&quot;208832379&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;
yMlUcrrEgkjUqzZaueoGSD+Jhms=&quot; data-reading_progress=&quot;0&quot;><a href=&
quot;https://www.scribd.com/document/208832379/US-Army-FM-3-38-Cyber-Electromagn
etic-Activities&quot; class=&quot;doc_link &quot;><div class=&quot;thumb object_
cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv2-1-f.scrib
dassets.com/img/document/208832379/fit_to_size/144x192/280e2f58bb/1486731111&quo
t; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/208832379/f
it_to_size/144x192/280e2f58bb/1486731111 1x, https://imgv2-2-f.scribdassets.com/
img/document/208832379/fit_to_size/288x384/a943227b07/1486731111 2x&quot; class=
&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;shadow_overla
y&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;main_action&q
uot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><div class=&
quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div class=&quot;o
verlay&quot;></div></div></div><div class=&quot;under_title_wrapper&quot;><div c
lass=&quot;under_title&quot;>US Army</div></div></a></li><li class=&quot;documen
t_cell object_cell &quot; data-object_type=&quot;document&quot; data-object_id=
&quot;259428604&quot; data-track=&quot;trending&quot; data-track_uuid=&quot;Eofg
COJrwqKNkh0V4DdnMOUKnTY=&quot; data-reading_progress=&quot;0&quot;><a href=&quot
;https://www.scribd.com/document/259428604/National-Cybersecurity-Protection-Adv
ancement-Act-Draft-3-20-15&quot; class=&quot;doc_link &quot;><div class=&quot;th
umb object_cell_hover &quot; style=&quot;&quot;><img data-src=&quot;https://imgv
2-1-f.scribdassets.com/img/document/259428604/fit_to_size/144x192/3fd2f17803/143
4873356&quot; data-srcset=&quot;https://imgv2-1-f.scribdassets.com/img/document/
259428604/fit_to_size/144x192/3fd2f17803/1434873356 1x, https://imgv2-1-f.scribd
assets.com/img/document/259428604/fit_to_size/288x384/0dd2e86f13/1434873356 2x&q
uot; class=&quot;lazy_loading&quot; alt=&quot;document&quot;><div class=&quot;sh
adow_overlay&quot;></div><div class=&quot;action_layer&quot;><div class=&quot;ma
in_action&quot;><div class=&quot;read_icon icon-ic_tableofcontents&quot;></div><
div class=&quot;play_icon icon-ic_audiobook_play_large&quot;></div></div><div cl
ass=&quot;overlay&quot;></div></div></div><div class=&quot;under_title_wrapper&q
uot;><div class=&quot;under_title&quot;>National Cybersecurity Protection Advanc
ement Act_Draft 3-20-15</div></div></a></li></ul></div></div><div><img src=&quot
;https://s2-f.scribdassets.com/images/home/logged_in/ic_home_control_left_arrow.
png?1494885498&quot; alt=&quot;carousel previous&quot; class=&quot;paddle page_l
eft carousel_prev&quot; data-track=&quot;carousel:previous&quot; aria-hidden=&qu
ot;true&quot;><img src=&quot;https://s1-f.scribdassets.com/images/home/logged_in
/ic_home_control_right_arrow.png?1494885498&quot; alt=&quot;carousel next&quot;
class=&quot;paddle page_right carousel_next&quot; data-track=&quot;carousel:next
&quot; aria-hidden=&quot;true&quot;></div></div><div class=&quot;carousel_scroll
bar&quot;><div class=&quot;carousel_scrollbar_thumb&quot;></div></div></div></di
v><script type=&quot;text/javascript&quot;>
//<![CDATA[
new Scribd.UI.Carousel(&quot;#autogen_id_503795426&quot;, {&quot;page&quot
;:false,&quot;compilation_id&quot;:&quot;8IbulvcG1Nw2brzpWJNQBdys3lg=&quot;,&quo
t;module_id&quot;:&quot;eabG2pQt6DwIXCMsd6CQ3DOfnEg=&quot;,&quot;widget_name&quo
t;:&quot;document_carousel:footer&quot;,&quot;sub_module&quot;:false})

//]]>
</script></div></div></div></div>"></div></div><script type="text/javascript">
//<![CDATA[
new Scribd.PdfsSsiRecommendations("#autogen_id_503778663", {"template":"discover
y","sidebar":[{"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=","module_id":"N2a3
+MutguorSFwcDBPpPFNyuho="},{"compilation_id":"8IbulvcG1Nw2brzpWJNQBdys3lg=","mod
ule_id":"DptMFYFLDvkwurl9Bk6M50UHswg="},{"compilation_id":"8IbulvcG1Nw2brzpWJNQB
dys3lg=","module_id":"eabG2pQt6DwIXCMsd6CQ3DOfnEg="}]});
//]]>
</script>
</div></div></div><div class="document_column"><div class="toolbar_drop"></div><
div class="document_scroller carousel_scroll_parent"><div class="document_contai
ner"><script type="text/javascript">DocumentManager.scrollParent = $(".document_
scroller")[0]</script><style></style>
<script type='text/javascript'>
var defaultViewWidth = defaultViewWidth || 847.0;
var docManager = new DocumentManager("scroll", "web_pro" == "mobile"); // Our
global manager for this view page
window.docManager = docManager;
docManager.setEmbeddedDoc('False');
docManager.fontAggregatorHosts = ["https://html1-f.scribdassets.com", "https:/
/html2-f.scribdassets.com"];
docManager.assetPrefix = "1s3xyq203k4w6rdr";
docManager.addFont(11, "b", "ff11", "Verdana, Verdana, Geneva, sans-serif", "b
old", "normal");
docManager.addFont(10, "", "ff10", "Arial, Arial, Helvetica, sans-serif", "nor
mal", "normal");
docManager.addFont(1, "", "ff1", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(0, "", "ff0", "Times New Roman, Times, serif", "normal", "n
ormal");
docManager.addFont(3, "b", "ff3", "Times New Roman, Times, serif", "bold", "no
rmal");
docManager.addFont(2, "b", "ff2", "Courier New, Courier New, Courier6", "bold"
, "normal");
docManager.addFont(5, "", "ff5", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(4, "", "ff4", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(7, "", "ff7", "Courier New, Courier New, Courier6", "normal
", "normal");
docManager.addFont(6, "b", "ff6", "Times New Roman, Times, serif", "bold", "no
rmal");
docManager.addFont(9, "", "ff9", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.addFont(8, "", "ff8", "Arial, Arial, Helvetica, sans-serif", "norma
l", "normal");
docManager.displayType = "vector";
docManager.initStyles();
docManager.setPageWidths(defaultViewWidth);
docManager.setImageDomainSubstitution(/http:\/\/html.scribd.com/, ["https://ht
ml1-f.scribdassets.com", "https://html2-f.scribdassets.com"]);
</script>
<link rel='stylesheet' type='text/css' href='https://html2-f.scribdassets.com/st
atic/4gen.css?1492188167'/>
<div id='font_preload_bed' style='position:absolute; height: 1px; left: 0; top:0
; max-width: 100%; visibility: hidden; overflow: hidden'> </div>
<script type='text/javascript'>
docManager.setupTestElements();
</script>
<div class="outer_page_container">

<div class="outer_page only_ie6_border "


id="outer_page_1"
style="width:902px; height:1167px; ">
<div class="newpage" id="page1" style="width: 902px; height:1167px">
<div class=text_layer style="z-index:2"><div class=ie_fix>
&nbsp;
<div class="ff11" style="font-size:87px">
<span class=a style="left:663px;top:545px;word-spacing:-3px">Malware is software
designed to access a computer or </span><span class=a style="left:663px;top:649
px;word-spacing:-3px">computer system and cause damage to a the <span class=w7><
/span> les, operating </span><span class=a style="left:663px;top:752px;word-spacing:
-3px">system, or functionality of the computer for monetary gain or </span><span
class=a style="left:663px;top:855px;word-spacing:2px;letter-spacing:-1px">to fr
ustrate the user. Used both legitimately by software </span><span class=a style="l
eft:663px;top:958px;word-spacing:-4px">companies engaged in vulnerability resear
ch and <span class=w6></span>the market </span><span class=a style="left:663px;t
op:1061px;word-spacing:-3px">for ad revenues, as <span class=w6></span>well as c
riminally--by underground hack<span class=l6>er </span></span><span class=a styl
e="left:663px;top:1164px;word-spacing:-4px">communities in the black <span class
=w6></span>market for personal information. </span><span class=a style="left:929
px;top:1275px;word-spacing:3px;letter-spacing:-1px">Malware In the Market </span
></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:1409px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1194px;top:1383px;word-spacing:5px;letter-spacing:-1px
"> lickware !raud "evenues </span></div>
<div class="ff10" style="font-size:26px">
<span class=a style="left:1327px;top:1514px"> </span></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:1628px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1194px;top:1601px;word-spacing:4px;letter-spacing:-1px
">#he $%ecurity &amp;ulnerability Market' </span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:1710px;word-spacing:-3px">Companies employ
hackers and programmers to fnd </span><span class=a style="left:1459px;top:1820p
x;word-spacing:-3px">and security vulnerabilities that exist in <span class=w7><
/span>various </span><span class=a style="left:1459px;top:1923px;word-spacing:-3
px">Operating Systems (Windows, android, iOS) and </span><span class=a style="le
ft:1459px;top:2026px;word-spacing:-3px">programs ( oogle Chrome, Outlook)! Sell the
<span class=w6></span>means </span><span class=a style="left:1459px;top:2129px;w
ord-spacing:-3px">"in#ormation, maleware code, hacking techni$ues% </span><span
class=a style="left:1459px;top:2232px;word-spacing:-3px">to third parties who <s
pan class=w8></span>exploit these security </span><span class=a style="left:1459
px;top:2335px;word-spacing:-3px">vulnerabilities in order to gather <span class=
w6></span>in#ormation #or </span><span class=a style="left:1459px;top:2439px;wor
d-spacing:-2px">various purposes</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:2564px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:2542px;word-spacing:-3px">Customers are gov
ernment agencies who exploit the </span><span class=a style="left:1459px;top:265
2px;word-spacing:-3px">security vulnerabilities to gather in#ormation or </span>
<span class=a style="left:1459px;top:2755px;word-spacing:-3px">invade&amp;disrup
t the computer systems (phones, </span><span class=a style="left:1459px;top:2858
px;word-spacing:-2px">laptops, etc!) o# crime suspects and <span class=w7></span
>intelligence </span><span class=a style="left:1459px;top:2961px">targets</span>
</div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:3091px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1194px;top:3064px;word-spacing:1px;letter-spacing:-1px
">&amp;upen </span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:3196px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:3173px;word-spacing:-4px">Company engaged <
span class=w6></span>in vulnerability research (' </span><span class=a style="left:1
;top:3283px;word-spacing:2px;letter-spacing:-1px">*ntrepreneurial Company o# the
+ear) ! </span><span class=a style="left:1459px;top:3386px;word-spacing:-2px">C
lients pay around , #or annual subscription </span><span class=a style="
pacing:-2px">plan to access and <span class=w8></span>shop -upen.s constantly </
span><span class=a style="left:1459px;top:3599px;word-spacing:-1px">developing c
atalog o# hacking techni$ues and </span><span class=a style="left:1459px;top:370
2px;letter-spacing:-1px">so#tware </span><span class=a style="left:1700px;top:38
13px;word-spacing:-2px;letter-spacing:-1px">/icroso#t <span class=w6></span>W<sp
an class=l6>ord</span></span></div>
<div class="ff8" style="font-size:33px">
<span class=a style="left:1592px;top:3949px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1700px;top:3928px;letter-spacing:-1px">0dobe </span><s
pan class=a style="left:1700px;top:4044px;word-spacing:-5px"> oogle.s 0ndroid</span>
</div>
<div class="ff8" style="font-size:33px">
<span class=a style="left:1592px;top:4180px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1700px;top:4159px;word-spacing:-3px">0pple.s iOS </spa
n><span class=a style="left:1459px;top:4267px;word-spacing:2px">1urchasin<span c
lass=l6>g a single <span class=l6>exploit, <span class=w style="width:23px"></sp
an>malware <span class=l7>code, or </span></span></span></span><span class=a sty
le="left:1459px;top:4377px;word-spacing:-4px">techni$ue can <span class=w7></spa
n>cost anywhere #rom 2 , 3</span><span class=a style="left:1459px;top:4480px;
<div class="ff8" style="font-size:33px">
<span class=a style="left:1592px;top:4612px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1700px;top:4590px;word-spacing:-3px">Screeni<span clas
s=l6>ng o# <span class=w7></span>clients #or non3democratic entities </span></sp
an><span class=a style="left:1700px;top:4705px;word-spacing:-3px">Contracts barr
ing resale or disclose o# </span><span class=a style="left:1725px;top:4814px">te
chni$ues </span><span class=a style="left:1459px;top:4917px;word-spacing:3px;let
ter-spacing:-1px">56rokers7 to connect hacker #riends and -upen </span><span cla
ss=a style="left:1459px;top:5027px;word-spacing:-3px">company with government co
ntacts</span></div>
<div class="ff7" style="font-size:41px">
<span class=a style="left:1061px;top:5158px">o</span></div>
</div>
</div>
<div class=image_layer style="z-index: 1">
<div class=ie_fix>
<img class="absimg" style="left:157px;top:83px;width:63px;height:226px;clip:rect
(175px 9px 183px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1-c2
9dbd217a.jpg"/>
<img class="absimg" style="left:236px;top:170px;width:63px;height:226px;clip:rec
t(175px 36px 181px 29px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1
-c29dbd217a.jpg"/>
<img class="absimg" style="left:245px;top:336px;width:63px;height:226px;clip:rec
t(175px 27px 182px 20px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1
-c29dbd217a.jpg"/>
<img class="absimg" style="left:254px;top:462px;width:63px;height:226px;clip:rec
t(175px 18px 225px 11px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1
-c29dbd217a.jpg"/>
<img class="absimg" style="left:264px;top:764px;width:63px;height:226px;clip:rec
t(1px 62px 99px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1-c29
dbd217a.jpg"/>
<img class="absimg" style="left:264px;top:820px;width:63px;height:226px;clip:rec
t(101px 62px 173px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/1-
c29dbd217a.jpg"/>
</div>
</div>
</div>

<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [11, 8,
2, 10, 9, 1, 7], "pageNum": 1};
pageParams.containerElem = document.getElementById("outer_page_1");
pageParams.innerPageElem = document.getElementById("page1");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>

<div id="between_page_ads_1"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(1);
</script>
</div>

<div class="outer_page only_ie6_border "


id="outer_page_2"
style="width:902px; height:1167px; ">
<div class="newpage" id="page2" style="width: 902px; height:1167px">
<div class=text_layer style="z-index:2"><div class=ie_fix>
&nbsp;
<div class="ff8" style="font-size:33px">
<span class=a style="left:796px;top:574px;color:#000000;opacity: 0.50;filter: al
pha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opacit
y=50)&quot;"></span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:929px;top:553px;word-spacing:-6px">Malware rime </span></
div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:687px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1194px;top:660px">"ansomware</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:792px;color:#000000;opacity: 0.50;filter: a
lpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opaci
ty=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:769px;word-spacing:-2px">0 type o# /alware
that attempts to extort money </span><span class=a style="left:1459px;top:879px;
word-spacing:4px;letter-spacing:-1px">#rom users by preventing or limiting them
#rom </span><span class=a style="left:1459px;top:982px;word-spacing:-3px">access
ing their computer system or <span class=w6></span>data! 8orces </span><span cla
ss=a style="left:1459px;top:1086px;word-spacing:-2px">victims to pay ransom via
online pa<span class=w6></span>yment methods </span><span class=a style="left:14
59px;top:1189px;word-spacing:-2px">using their credit cards in order to gain bac
k <span class=w6></span>access </span><span class=a style="left:1459px;top:1292p
x;word-spacing:-1px">to their computers or get their data back</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:1417px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:1395px;word-spacing:3px;letter-spacing:-1px
">8irst emerged in ' 9 in *astern *uropean countries </span><span class=a style="left:1
459px;top:1505px;word-spacing:-3px">such as <span class=w6></span>:ussia</span><
/div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:1630px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:1608px;word-spacing:-3px">1ro#essional Cybe
r<span class=l7>gangs " <span class=w7></span>community groups o# </span></span>
<span class=a style="left:1459px;top:1718px;word-spacing:-4px">underground hacke
rs who use <span class=w6></span>ransomware to extort </span><span class=a style
="left:1459px;top:1821px;word-spacing:2px;letter-spacing:-1px">money! ;as increa
sed over the last two years</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:1947px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:1924px;word-spacing:-3px">&lt;ntelligent ma
lware that attacks your <span class=w6></span>computer, </span><span class=a sty
le="left:1459px;top:2034px;word-spacing:-2px">identifes your location via your &
lt;1 address, and </span><span class=a style="left:1459px;top:2137px;word-spacin
g:-2px">presents a =ransom. message in local language <span class=w6></span>with
</span><span class=a style="left:1459px;top:2240px;word-spacing:-2px">the logo
o# <span class=w6></span>a local public authority (86&lt;, State <span class=w6>
</span>1olice<span class=l6>, </span></span><span class=a style="left:1459px;top
:2344px">etc!)</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:2572px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:2550px;word-spacing:-2px">&gt;isables user
access and computer #unction, <span class=w6></span>tricking </span><span class=
a style="left:1459px;top:2660px;word-spacing:-1px">users into thinking the only
way to gain back access </span><span class=a style="left:1459px;top:2763px;word-
spacing:-1px">is to pay the fne </span><span class=a style="left:1700px;top:2977
px;word-spacing:-3px">W<span class=l7>ave attacks on <span class=w8></span>sever
al thousand computers </span></span><span class=a style="left:1725px;top:3084px;
word-spacing:-1px">over the span o# a #ew days</span></div>
<div class="ff8" style="font-size:33px">
<span class=a style="left:1592px;top:3216px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1672px;top:3195px">?<span class=l style="margin-left:-15
px">ypically charge<span class=l6>s between @ to '<span class=l6> to </span></
n><span class=a style="left:1725px;top:3303px;word-spacing:-2px">unlock a comput
er </span><span class=a style="left:1700px;top:3414px;word-spacing:-1px">Studyy
o# a specifc attack showed that '!9A o# </span><span class=a style="left:1725px;
top:3521px;word-spacing:-2px">aBected users paid the ransom, netting </span><spa
n class=a style="left:1725px;top:3624px;word-spacing:2px;letter-spacing:-1px">be
tween 4 , 3 , in a single day!</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:3750px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:3727px;word-spacing:-2px">Over last ' years
variants being developed to <span class=w6></span>exploit </span><span class=a
style="left:1459px;top:3837px;word-spacing:-2px">security vulnerabilitie<span cl
ass=l6>s and bypass <span class=w7></span>frewall<span class=l6>s and anti3</spa
n></span></span><span class=a style="left:1459px;top:3940px;word-spacing:-6px">v
irus so#tware</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:4066px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:4044px;word-spacing:-3px">&lt;mportant to c
onstantly <span class=w6></span>update anti3virus so#tware</span></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:4180px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1194px;top:4153px;word-spacing:-6px">(lackmark<span cl
ass=l6>et for <span class=w9></span>Information )spyware* </span></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:4263px;word-spacing:-3px">Dndergro<span cla
ss=l6>und community o# <span class=w7></span>entities and hackers who </span></s
pan><span class=a style="left:1459px;top:4372px;word-spacing:-3px">live on under
ground #orums! &gt;evelop <span class=w6></span>and use 1roft3</span><span class
=a style="left:1459px;top:4475px;word-spacing:-2px">oriented malware designed to
steal data #rom home </span><span class=a style="left:1459px;top:4579px;word-sp
acing:-1px">users and businesses! &gt;ata is then sold in the </span><span class
=a style="left:1459px;top:4682px;word-spacing:-3px">5blackmarke<span class=l6>t7
to <span class=w7></span>third parties who use <span class=w6></span>in#ormatio
n </span></span><span class=a style="left:1459px;top:4785px;word-spacing:3px;let
ter-spacing:-1px">#or proft by committing #raud and stealing money! </span><span
class=a style="left:1700px;top:4896px;word-spacing:-2px">&lt;dentity &gt;ata "
social security numbers, </span><span class=a style="left:1725px;top:5003px;word
-spacing:-4px">addresses, emails, personal p<span class=w6></span>re#er<span cla
ss=l8>ences and </span></span><span class=a style="left:1725px;top:5106px;word-s
pacing:-2px">other personal in#o</span></div>
</div>
</div>
<div class=image_layer style="z-index: 1">
<div class=ie_fix>
<img class="absimg" style="left:157px;top:15px;width:10px;height:364px;clip:rect
(98px 9px 106px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-161
b651c95.jpg"/>
<img class="absimg" style="left:264px;top:-200px;width:10px;height:364px;clip:re
ct(357px 8px 363px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-
161b651c95.jpg"/>
<img class="absimg" style="left:264px;top:48px;width:10px;height:364px;clip:rect
(234px 8px 346px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-16
1b651c95.jpg"/>
<img class="absimg" style="left:264px;top:165px;width:10px;height:364px;clip:rec
t(348px 8px 355px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-1
61b651c95.jpg"/>
<img class="absimg" style="left:317px;top:597px;width:10px;height:364px;clip:rec
t(1px 9px 96px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-161b
651c95.jpg"/>
<img class="absimg" style="left:264px;top:630px;width:10px;height:364px;clip:rec
t(118px 8px 232px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-1
61b651c95.jpg"/>
<img class="absimg" style="left:317px;top:874px;width:10px;height:364px;clip:rec
t(108px 9px 116px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/2-1
61b651c95.jpg"/>
</div>
</div>
</div>

<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [8, 11,
2, 9, 1], "pageNum": 2};
pageParams.containerElem = document.getElementById("outer_page_2");
pageParams.innerPageElem = document.getElementById("page2");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>

<div id="between_page_ads_2"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(2);
</script>
</div>

<div class="outer_page only_ie6_border "


id="outer_page_3"
style="width:902px; height:1167px; ">
<div class="newpage" id="page3" style="width: 902px; height:1167px">
<div class=text_layer style="z-index:2"><div class=ie_fix>
&nbsp;
<div class="ff8" style="font-size:33px">
<span class=a style="left:1592px;top:574px;color:#000000;opacity: 0.50;filter: a
lpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opaci
ty=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1700px;top:553px;word-spacing:-4px">6anking &lt;n#orma
tion3 </span><span class=a style="left:1700px;top:668px;word-spacing:3px;letter-
spacing:-1px">1asswords E Dser names </span><span class=a style="left:1459px;top
:776px;word-spacing:-3px">F@4, 3 new malware threats and <span class=w6></span>explo
eing </span><span class=a style="left:1459px;top:886px;word-spacing:-3px">develo
ped every day </span><span class=a style="left:1459px;top:989px;word-spacing:-2p
x">Since ' 3 evolution o# malware and hacking </span><span class=a style="left:1459p
:1099px;word-spacing:-2px">techni$ues &gt;esigned to Steal consumer banking </sp
an><span class=a style="left:1459px;top:1202px">in#ormation</span></div>
<div class="ff7" style="font-size:41px">
<span class=a style="left:1061px;top:1334px">o</span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1194px;top:1305px;word-spacing:-2px">;ow it works</spa
n></div>
<div class="ff10" style="font-size:26px">
<span class=a style="left:1327px;top:1436px"> </span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:1414px;word-spacing:-3px">6uyers make conta
ct via online <span class=w6></span>#orums or specialiGed</span><span class=a st
yle="left:1459px;top:1523px;word-spacing:-4px">black market sites</span></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:1653px">o</span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1194px;top:1627px;word-spacing:10px;letter-spacing:-1p
x">6lackmarket services </span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1459px;top:1736px;word-spacing:-4px"> redit ards + <span clas
s=w6></span>Information</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:1868px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1459px;top:1845px;word-spacing:2px;letter-spacing:-1px
"> esign + publishing of !ake nline %tores</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:1977px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1459px;top:1955px;word-spacing:2px;letter-spacing:-1px
">%ale of online service accounts )paypal, ebay, </span><span class=a style="lef
t:1459px;top:2065px;word-spacing:-4px;letter-spacing:-1px">facebook, <span class
=w11></span>twitter<span class=l11>.</span></span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:2190px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:1459px;top:2168px;letter-spacing:-1px"> ard loners + !ake #
pan></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:2300px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1431px;top:2278px">?<span class=l12>ry and 6uy " garunte
e money b<span class=l6>ack oBer i# doesn.t </span></span></span><span class=a s
tyle="left:1459px;top:2388px">work </span><span class=a style="left:1459px;top:2
491px;word-spacing:-2px">Haundering " via product purchases and bank </span><spa
n class=a style="left:1459px;top:2601px;word-spacing:-3px">account trans#ers</sp
an></div>
<div class="ff10" style="font-size:26px">
<span class=a style="left:1327px;top:2726px"> </span></div>
<div class="ff5" style="font-size:33px">
<span class=a style="left:796px;top:2845px"> </span></div>
<div class="ff3" style="font-size:86px">
<span class=a style="left:929px;top:2824px">Laundering Purchase &amp; forwarding o
f products</span></div>
<div class="ff5" style="font-size:33px">
<span class=a style="left:796px;top:2967px"> </span></div>
<div class="ff0" style="font-size:80px">
<span class=a style="left:929px;top:2952px;word-spacing:-1px">Many of the buyers
who are looking for credit card details use them to buy goods.</span><span clas
s=a style="left:929px;top:3060px;word-spacing:-1px">This is a way of immediately
laundering the <span class=w6></span>money. But there is a small problem: </spa
n><span class=a style="left:929px;top:3166px;word-spacing:-1px">they have to giv
e de<span class=w6></span>tails for identifying the buyer and sending the <span
class=w6></span>merchandise.</span></div>
<div class="ff5" style="font-size:33px">
<span class=a style="left:796px;top:3295px"> </span></div>
<div class="ff0" style="font-size:80px">
<span class=a style="left:929px;top:3280px;word-spacing:-1px">With this in mind,
vendors also offer a service for purchasing g<span class=w6></span>oods and </s
pan><span class=a style="left:929px;top:3388px;word-spacing:-1px">forwarding the
m to any address, thereby preventing <span class=w6></span>the buyer from being
located.</span></div>
<div class="ff5" style="font-size:33px">
<span class=a style="left:796px;top:3517px"> </span></div>
<div class="ff0" style="font-size:80px">
<span class=a style="left:929px;top:3502px;word-spacing:-1px">Obviously this ser
vice also comes at an additional cost:</span></div>
<div class="ff7" style="font-size:41px">
<span class=a style="left:1061px;top:3632px">o</span></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:3739px">o</span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1194px;top:3712px;letter-spacing:-1px">:ansomware </sp
an><span class=a style="left:1459px;top:3821px;word-spacing:-2px">/alware that a
Bects personal computers by locking </span><span class=a style="left:1459px;top:
3931px;word-spacing:-1px">them and barring use access until a #ee is paid! </spa
n><span class=a style="left:1459px;top:4034px;word-spacing:-4px">Hiterally 5rans
oms7 your computer</span></div>
<div class="ff5" style="font-size:33px">
<span class=a style="left:796px;top:4166px"> </span></div>
<div class="ff8" style="font-size:33px">
<span class=a style="left:796px;top:4384px;color:#000000;opacity: 0.50;filter: a
lpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opaci
ty=50)&quot;"></span></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:929px;top:4363px;word-spacing:-3px">Malware and the /a
w <span class=w6></span>0 ine1ective and minor legal </span><span class=a style="l
eft:929px;top:4471px">regimes </span></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:4601px">o</span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1166px;top:4574px">?he law is extr<span class=l7>emely m
inim<span class=l7>al in this area, 8?<span class=l11>C has not </span></span></
span></span><span class=a style="left:1194px;top:4683px;word-spacing:-3px">pushe
d #or a<span class=w6></span>nti3malwar<span class=l6>e legislation </span></spa
n></div>
<div class="ff2" style="font-size:42px">
<span class=a style="left:1061px;top:4813px">o</span></div>
<div class="ff11" style="font-size:87px">
<span class=g style="top:4786px"><span class=a style="left:1194px;word-spacing:-
2px">2. User ontrol + onsent )</span></span>
</div>
<div class="ff6" style="font-size:79px">
<span class=a style="left:2561px;top:4786px;word-spacing:-5px">Direct Revenue</s
pan></div>
<div class="ff11" style="font-size:87px">
<span class=a style="left:3321px;top:4786px"></span></div>
<div class="ff6" style="font-size:79px">
<span class=a style="left:3321px;top:4786px">)</span></div>
<div class="ff9" style="font-size:26px">
<span class=a style="left:1327px;top:4917px;color:#000000;opacity: 0.50;filter:
alpha(opacity=50);-ms-filter: &quot;progid:DXImageTransform.Microsoft.Alpha(Opac
ity=50)&quot;"></span></div>
<div class="ff1" style="font-size:86px">
<span class=a style="left:1459px;top:4895px;word-spacing:-2px">5click o# the but
ton <span class=w6></span>consent " user control over </span><span class=a style
="left:1459px;top:5005px;word-spacing:-2px">installation means giving consent vi
a clicking a </span><span class=a style="left:1459px;top:5108px;word-spacing:-2p
x">button to agree to terms o# a <span class=w7></span>user end3user license </s
pan><span class=a style="left:1459px;top:5211px;word-spacing:-5px">agreement (*D
H0) </span></div>
</div>
</div>
<div class=image_layer style="z-index: 1">
<div class=ie_fix>
<img class="absimg" style="left:264px;top:112px;width:63px;height:256px;clip:rec
t(1px 62px 95px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/3-676
a85f669.jpg"/>
<img class="absimg" style="left:254px;top:253px;width:63px;height:256px;clip:rec
t(97px 18px 255px 11px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/3-
676a85f669.jpg"/>
<img class="absimg" style="left:245px;top:670px;width:63px;height:256px;clip:rec
t(97px 27px 104px 20px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/3-
676a85f669.jpg"/>
<img class="absimg" style="left:157px;top:778px;width:63px;height:256px;clip:rec
t(97px 9px 105px 1px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/3-67
6a85f669.jpg"/>
<img class="absimg" style="left:236px;top:885px;width:63px;height:256px;clip:rec
t(97px 36px 103px 29px)" orig="http://html.scribd.com/1s3xyq203k4w6rdr/images/3-
676a85f669.jpg"/>
</div>
</div>
</div>

<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [8, 1,
9, 7, 10, 2, 11, 5, 3, 0, 6], "pageNum": 3};
pageParams.containerElem = document.getElementById("outer_page_3");
pageParams.innerPageElem = document.getElementById("page3");
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>

<div id="between_page_ads_3"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(3);
</script>
</div>

<div class="outer_page only_ie6_border "


id="outer_page_4"
style="width:902px; height:1167px; ">
<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [9, 1,
8, 2, 11, 5, 4, 7, 10], "pageNum": 4};
pageParams.containerElem = document.getElementById("outer_page_4");
pageParams.contentUrl = "https://html2-f.scribdassets.com/1s3xyq203k4w
6rdr/pages/4-30bef844dc.jsonp";
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>

<div id="between_page_ads_4"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(4);
</script>
</div>

<div class="outer_page only_ie6_border "


id="outer_page_5"
style="width:902px; height:1167px; ">
<div class="b_tl"></div>
<div class="b_tr"></div>
<div class="b_br"></div>
<div class="b_bl"></div>
<div class="b_t"></div>
<div class="b_r"></div>
<div class="b_b"></div>
<div class="b_l"></div>
</div>
<script type='text/javascript'>
(function() {
var pageParams = {"origHeight": 1167, "origWidth": 902, "fonts": [5, 1,
7, 10, 11], "pageNum": 5};
pageParams.containerElem = document.getElementById("outer_page_5");
pageParams.contentUrl = "https://html1-f.scribdassets.com/1s3xyq203k4w
6rdr/pages/5-f410ba5cd4.jsonp";
pageParams.blur = false
var page = docManager.addPage(pageParams);
})();
</script>

<div id="between_page_ads_5"
class="between_page_ads"
style="display: block;">
<script type="text/javascript">
Scribd.Ads.addBetweenPageUnit(5);
</script>
</div>
<!--[if IE]>
<script type='text/javascript'>
window.docManagerIEAdded = true;
if (document.observe) {
document.observe('dom:loaded', function () {
docManager.allPagesAdded();
});
} else {
window.attachEvent('onload', function () {
docManager.allPagesAdded();
});
}
</script>
<![endif]-->
<script type='text/javascript'>
if (window.docManagerIEAdded != true) {
docManager.allPagesAdded();
}
</script>
</div>

</div><div class="document_footer discover"><div class="inner_footer "><div clas


s="footer_recommended_docs_drop"></div></div></div><div class="autogen_class_vie
ws_chrome_footer autogen_class_widgets_base global_footer narrow_columns" id="gl
obal_footer"><div class="inner"><div class="columns"><div class="joint_column"><
div class="column "><strong class="social_title">About</strong><ul class="list">
<li><a href="https://www.scribd.com/books">Browse books</a></li><li><a href="htt
ps://www.scribd.com/directory">Site directory</a></li><li><a href="https://www.s
cribd.com/about">About Scribd</a></li><li><a href="https://www.scribd.com/about/
team">Meet the team</a></li><li><a href="http://literally.scribd.com/">Our blog<
/a></li><li><a href="https://www.scribd.com/about/jobs">Join our team!</a></li><
li><a href="https://www.scribd.com/contact">Contact Us</a></li></ul></div><div c
lass="column "><strong class="social_title">Partners</strong><ul class="list"><l
i><a href="https://www.scribd.com/publishers">Publishers</a></li><li><a href="ht
tps://www.scribd.com/developers">Developers / API</a></li></ul></div><div class=
"column legal"><strong class="social_title">Legal</strong><ul class="list"><li><
a href="https://www.scribd.com/terms">Terms</a></li><li><a href="https://www.scr
ibd.com/privacy">Privacy</a></li><li><a href="https://www.scribd.com/copyright">
Copyright</a></li></ul></div></div><div class="joint_column"><div class="column
"><strong class="social_title">Support</strong><ul class="list"><li><a href="htt
p://support.scribd.com/login">Help</a></li><li><a href="https://www.scribd.com/f
aq">FAQ</a></li><li><a href="http://support.scribd.com/entries/107868373-Scribd-
Accessibility-Policy">Accessibility</a></li><li><a href="https://www.scribd.com/
press">Press</a></li><li><a href="http://support.scribd.com/forums/189164-Purcha
ses-subscriptions-and-refunds">Purchase help</a></li><li><span class="sprite ad_
choices"></span><a href="https://www.scribd.com/faq?item=adchoices">AdChoices</a
></li></ul></div><div class="column "><strong class="social_title">Memberships</
strong><ul class="list"><li><a href="https://www.scribd.com/subscribe">Join toda
y</a></li><li><a href="https://www.scribd.com/referrals?source=footer">Invite Fr
iends</a></li><li><a href="https://www.scribd.com/giftcards">Gifts</a></li></ul>
</div><div class="column social_container"><ul class="list"><div class="autogen_
class_views_chrome_social_buttons autogen_class_widgets_base social_icons" id="a
utogen_id_931959634"><span class="icontainer"><a class="icon icon-ic_scribd_soci
al_logo scribd" href="http://literally.scribd.com" aria-label="Scribd Blog"></a>
</span><span class="icontainer"><a class="icon icon-ic_facebook facebook" href=
"https://www.facebook.com/pages/Scribd/6978454082" aria-label="Scribd on Faceboo
k"></a></span><span class="icontainer"><a class="icon icon-ic_twitter twitter" h
ref="https://twitter.com/scribd" aria-label="Scribd on Twitter"></a></span><span
class="icontainer"><a class="icon icon-ic_pinterest pinterest" href="https://ww
w.pinterest.com/scribd/" aria-label="Scribd on Pinterest"></a></span></div><div
class="mobile_icons"><a href="https://itunes.apple.com/us/app/scribd-worlds-larg
est-online/id542557212?mt=8&amp;uo=4&amp;at=11lGEE" class="app_link"><img src="h
ttps://s1-f.scribdassets.com/images/footer/apple-badge2x.png?1494885498" alt="Sc
ribd on Appstore" class="app_store_img"></a><a href="https://play.google.com/sto
re/apps/details?id=com.scribd.app.reader0&amp;hl=en" class="app_link"><img src="
https://s2-f.scribdassets.com/images/footer/google-play-badge.png?1494885498" al
t="Scribd on Google Play" class="app_store_img play_store_link"></a></div></ul><
/div></div></div><div class="autogen_class_views_chrome_footer_links autogen_cla
ss_widgets_base secondary_links" id="autogen_id_341314253"><span class="copyrigh
t secondary">Copyright &copy; 2017 Scribd Inc. </span><span class="dot_divider">
.</span><a href="https://www.scribd.com/terms" class="secondary">Terms of servic
e</a><span class="dot_divider hide_on_responsive">.</span><a href="http://suppor
t.scribd.com/entries/107868373-Scribd-Accessibility-Policy" class="secondary">Ac
cessibility</a><span class="dot_divider">.</span><a href="https://www.scribd.com
/privacy" class="secondary">Privacy</a><span class="dot_divider">.</span><a href
="https://www.scribd.com/mobile?remobile=1" class="secondary">Mobile Site</a><sp
an class="dot_divider">.</span><span class="secondary language">Site Language: <
div class="autogen_class_views_chrome_language_selector autogen_class_widgets_ba
se footer_cell" id="autogen_id_341315198"><div class="autogen_class_views_shared
_popover autogen_class_widgets_base popover top " id="autogen_id_341312299"><div
class="popover_trigger"><div class="language"><a class="language_link"></a> </d
iv></div><div class="popover_content"><div class="popover_arrow"></div><div clas
s="language_selector"><div class="language_list"><div data-id="en" class="item">
<a href="/language?destination=https%3A%2F%2Fwww.scribd.com%2Fdocument%2F2907883
15%2FNotes-for-Presentation-Malware&amp;id=en" class="change_language" rel="nofo
llow">English</a></div><div data-id="zh" class="item"><a href="/language?destina
tion=https%3A%2F%2Fzh.scribd.com%2Fdocument%2F290788315%2FNotes-for-Presentation
-Malware&amp;id=zh" class="change_language" rel="nofollow"> </a></div><div data-id="es"
class="item"><a href="/language?destination=https%3A%2F%2Fes.scribd.com%2Fdocum
ent%2F290788315%2FNotes-for-Presentation-Malware&amp;id=es" class="change_langua
ge" rel="nofollow">Espaol</a></div><div data-id="ar" class="item"><a href="/langua
ge?destination=https%3A%2F%2Far.scribd.com%2Fdocument%2F290788315%2FNotes-for-Pr
esentation-Malware&amp;id=ar" class="change_language" rel="nofollow"> </a></div>
t-br" class="item"><a href="/language?destination=https%3A%2F%2Fpt.scribd.com%2F
document%2F290788315%2FNotes-for-Presentation-Malware&amp;id=pt-br" class="chang
e_language" rel="nofollow">Portugus</a></div><div data-id="ja" class="item"><a hre
f="/language?destination=https%3A%2F%2Fja.scribd.com%2Fdocument%2F290788315%2FNo
tes-for-Presentation-Malware&amp;id=ja" class="change_language" rel="nofollow"> </a><
<div data-id="de" class="item"><a href="/language?destination=https%3A%2F%2Fde.s
cribd.com%2Fdocument%2F290788315%2FNotes-for-Presentation-Malware&amp;id=de" cla
ss="change_language" rel="nofollow">Deutsch</a></div><div data-id="fr" class="it
em"><a href="/language?destination=https%3A%2F%2Ffr.scribd.com%2Fdocument%2F2907
88315%2FNotes-for-Presentation-Malware&amp;id=fr" class="change_language" rel="n
ofollow">Franais</a></div><div data-id="tr" class="item"><a href="/language?destin
ation=https%3A%2F%2Ftr.scribd.com%2Fdocument%2F290788315%2FNotes-for-Presentatio
n-Malware&amp;id=tr" class="change_language" rel="nofollow">Turkce</a></div><div
data-id="ru" class="item"><a href="/language?destination=https%3A%2F%2Fru.scrib
d.com%2Fdocument%2F290788315%2FNotes-for-Presentation-Malware&amp;id=ru" class="
change_language" rel="nofollow"> </a></div><div data-id="vi" class="ite
on=https%3A%2F%2Fvi.scribd.com%2Fdocument%2F290788315%2FNotes-for-Presentation-M
alware&amp;id=vi" class="change_language" rel="nofollow">Ting vi t</a></div><div data-i
d="pl" class="item"><a href="/language?destination=https%3A%2F%2Fpl.scribd.com%2
Fdocument%2F290788315%2FNotes-for-Presentation-Malware&amp;id=pl" class="change_
language" rel="nofollow">J zyk polski</a></div><div data-id="id" class="item"><a hr
ef="/language?destination=https%3A%2F%2Fid.scribd.com%2Fdocument%2F290788315%2FN
otes-for-Presentation-Malware&amp;id=id" class="change_language" rel="nofollow">
Bahasa indonesia</a></div></div></div></div></div></div></span></div></div></div
></div><div class="autogen_class_views_pdfs_upvote autogen_class_widgets_base" i
d="autogen_id_341313585"><div class="title">This document is...</div><span class
="vote thumbs_up"><span class="icon icon-ic_thumbsup_outline_small"></span><span
class="on_selected icon icon-ic_thumbsup_fill_small"></span><span class="vote_l
abel">Useful</span></span><span class="vote thumbs_down"><span class="icon icon-
ic_thumbsdown_outline_small"></span><span class="on_selected icon icon-ic_thumbs
down_fill_small"></span><span class="vote_label">Not useful</span></span><span c
lass="icon-ic_close close"></span></div></div></div><div class="templates"><scri
pt type="text/template" id="page_blur_promo_template"><div class="autogen_class_
views_pdfs_page_blur_promo autogen_class_widgets_base" id="autogen_id_341318959"
><div class="page_blur_promo_overlay"></div><div class="page_blur_promo"><h2 cla
ss="page_blur_promo_title">You&#39;re Reading a Free Preview</h2><p class="gap">
</p><button class="missing_page_buy_button download flat_btn"><span class="scrib
d_spinner permanent_rotation" data-size="30"></span><span class="flat_btn_conten
t">Download</span></button></div></div></script></div></div></div><div id="light
boxes" class="carousel_scroll_parent"><div id="confirm_lightbox" data-track_cate
gory="confirm_lightbox" class="lightbox autogen_class_views_shared_confirm_light
box autogen_class_widgets_lightbox autogen_class_widgets_base" style="display: n
one;" aria-labelledby="main_heading" role="dialog" tabIndex="-1"><div class="wra
pper"><button class="close_button" type="button"><span class="icon-ic_close"></s
pan><span class="visually_hidden">Close Dialog</span></button><div class="title"
id="main_heading">Are you sure?</div><div class="content"><div class="inline_fl
ash"></div><div class="rendered_template_container"><p class="confirm_text">This
action might not be possible to undo. Are you sure you want to continue?</p><di
v class="actions"><button class="cancel_btn outline_btn flat_btn" data-track="ca
ncel"><span class="scribd_spinner permanent_rotation" data-size="30"></span><spa
n class="flat_btn_content">CANCEL</span></button><button class="ok_btn flat_btn"
data-track="confirm"><span class="scribd_spinner permanent_rotation" data-size=
"30"></span><span class="flat_btn_content">OK</span></button></div></div><div da
ta-default="<p class=&quot;confirm_text&quot;>{{confirm_text}}</p><div class=&qu
ot;actions&quot;><button class=&quot;cancel_btn outline_btn flat_btn&quot; data-
track=&quot;cancel&quot;><span class=&quot;scribd_spinner permanent_rotation&quo
t; data-size=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>{{ca
ncel_label}}</span></button><button class=&quot;ok_btn flat_btn&quot; data-track
=&quot;confirm&quot;><span class=&quot;scribd_spinner permanent_rotation&quot; d
ata-size=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>{{confir
m_label}}</span></button></div>" data-delete_collection="<div class=&quot;input_
template_wrapper&quot;><div class=&quot;autogen_class_views_shared_input autogen
_class_widgets_base &quot; id=&quot;autogen_id_341342812&quot;><div class=&quot;
checkbox input_container input_trigger &quot;><span class=&quot;icon-ic_checkbox
_outline icon checkbox_icon&quot;></span><span class=&quot;icon-ic_checkbox_fill
icon checkbox_icon&quot;></span><span class=&quot;label&quot;>Also remove every
thing in this list from your library.</span><input name=&quot;remove_from_librar
y_confirm&quot; value=&quot;true&quot; type=&quot;checkbox&quot; class=&quot;rou
nded&quot;></div></div><script type=&quot;text/javascript&quot;>
//<![CDATA[
new Scribd.Input(&quot;#autogen_id_341342812&quot;, {selected: false});

//]]>
</script></div><div class=&quot;actions&quot;><button class=&quot;cancel_btn out
line_btn flat_btn&quot; data-track=&quot;cancel&quot; type=&quot;button&quot;><s
pan class=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot;
></span><span class=&quot;flat_btn_content&quot;>cancel</span></button><button c
lass=&quot;ok_btn flat_btn&quot; data-track=&quot;confirm&quot;><span class=&quo
t;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot;></span><span
class=&quot;flat_btn_content&quot;>delete list</span></button></div>" data-delet
e_empty_collection="<div class=&quot;input_template_wrapper&quot;><p class=&quot
;confirm_text&quot;>Are you sure you want to delete this list?</p></div><div cla
ss=&quot;actions&quot;><button class=&quot;cancel_btn outline_btn flat_btn&quot;
data-track=&quot;cancel&quot; type=&quot;button&quot;><span class=&quot;scribd_
spinner permanent_rotation&quot; data-size=&quot;30&quot;></span><span class=&qu
ot;flat_btn_content&quot;>cancel</span></button><button class=&quot;ok_btn flat_
btn&quot; data-track=&quot;confirm&quot;><span class=&quot;scribd_spinner perman
ent_rotation&quot; data-size=&quot;30&quot;></span><span class=&quot;flat_btn_co
ntent&quot;>delete list</span></button></div>" data-multiple_remove_from_library
="<p class=&quot;confirm_text&quot;>Everything you selected will also be removed
from your lists.</p><div class=&quot;actions&quot;><button class=&quot;cancel_b
tn outline_btn flat_btn&quot; data-track=&quot;cancel&quot; type=&quot;button&qu
ot;><span class=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30
&quot;></span><span class=&quot;flat_btn_content&quot;>cancel</span></button><bu
tton class=&quot;ok_btn flat_btn&quot; data-track=&quot;confirm&quot;><span clas
s=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot;></span>
<span class=&quot;flat_btn_content&quot;>remove from Saved</span></button></div>
" data-remove_from_library="<p class=&quot;confirm_text&quot;>This book will als
o be removed from all your lists.</p><div class=&quot;actions&quot;><button clas
s=&quot;cancel_btn outline_btn flat_btn&quot; data-track=&quot;cancel&quot; type
=&quot;button&quot;><span class=&quot;scribd_spinner permanent_rotation&quot; da
ta-size=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>cancel</s
pan></button><button class=&quot;ok_btn flat_btn&quot; data-track=&quot;confirm&
quot;><span class=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;
30&quot;></span><span class=&quot;flat_btn_content&quot;>remove from Saved</span
></button></div>" data-change_library_state="<div class=&quot;change_library_sta
te_template&quot;><p class=&quot;confirm_text&quot;>{{confirm_text}}</p><div cla
ss=&quot;actions&quot;><button class=&quot;cancel_btn outline_btn flat_btn&quot;
data-track=&quot;cancel&quot; type=&quot;button&quot;><span class=&quot;scribd_
spinner permanent_rotation&quot; data-size=&quot;30&quot;></span><span class=&qu
ot;flat_btn_content&quot;>cancel</span></button><button class=&quot;ok_btn flat_
btn&quot; data-track=&quot;confirm&quot;><span class=&quot;scribd_spinner perman
ent_rotation&quot; data-size=&quot;30&quot;></span><span class=&quot;flat_btn_co
ntent&quot;>ok</span></button></div></div>" data-remove_from_collection="<div cl
ass=&quot;input_template_wrapper large_input&quot;><div class=&quot;autogen_clas
s_views_shared_input autogen_class_widgets_base &quot; id=&quot;autogen_id_34134
3019&quot;><div class=&quot;checkbox input_container input_trigger &quot;><span
class=&quot;icon-ic_checkbox_outline icon checkbox_icon&quot;></span><span class
=&quot;icon-ic_checkbox_fill icon checkbox_icon&quot;></span><span class=&quot;l
abel&quot;>Remove them from Saved? (They ll also be removed from your other lists.)<
/span><input name=&quot;remove_from_collection_confirm&quot; value=&quot;true&qu
ot; type=&quot;checkbox&quot; class=&quot;rounded&quot;></div></div><script type
=&quot;text/javascript&quot;>
//<![CDATA[
new Scribd.Input(&quot;#autogen_id_341343019&quot;, {selected: false});
//]]>
</script><div class=&quot;actions&quot;><button class=&quot;cancel_btn outline_b
tn flat_btn&quot; data-track=&quot;cancel&quot; type=&quot;button&quot;><span cl
ass=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot;></spa
n><span class=&quot;flat_btn_content&quot;>cancel</span></button><button class=&
quot;ok_btn flat_btn&quot; data-track=&quot;confirm&quot;><span class=&quot;scri
bd_spinner permanent_rotation&quot; data-size=&quot;30&quot;></span><span class=
&quot;flat_btn_content&quot;>remove</span></button></div></div>" data-error="<di
v class=&quot;error_template&quot;><p class=&quot;confirm_text&quot;>{{confirm_t
ext}}</p><div class=&quot;actions&quot;><button class=&quot;ok_btn flat_btn&quot
; data-track=&quot;ok&quot;><span class=&quot;scribd_spinner permanent_rotation&
quot; data-size=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>o
k</span></button></div></div>" data-audio_reading_progress="<div class=&quot;aud
io_reading_progress_template&quot;><div class=&quot;confirm_text&quot;><p>You&am
p;#39;re currently on {{currently_on}}. However, it looks like you listened to {
{listened_to}} on {{device_name}} {{time}}.</p><p>Jump {{jump_to}}?</p></div><di
v class=&quot;actions&quot;><button class=&quot;cancel_btn flat_btn&quot; data-t
rack=&quot;no&quot;><span class=&quot;scribd_spinner permanent_rotation&quot; da
ta-size=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>No</span>
</button><button class=&quot;ok_btn flat_btn&quot; data-pos=&quot;{{JSON.stringi
fy(pos_data)}}&quot; data-track=&quot;yes&quot;><span class=&quot;scribd_spinner
permanent_rotation&quot; data-size=&quot;30&quot;></span><span class=&quot;flat
_btn_content&quot;>Yes</span></button></div></div>" data-delete_review="<div cla
ss=&quot;confirm_text&quot;><div>{{content_line_one}}</div><div>{{content_line_t
wo}}</div></div><div class=&quot;actions&quot;><button class=&quot;cancel_btn ou
tline_btn flat_btn&quot; data-track=&quot;cancel&quot; type=&quot;button&quot;><
span class=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot
;></span><span class=&quot;flat_btn_content&quot;>cancel</span></button><button
class=&quot;ok_btn flat_btn&quot; data-track=&quot;confirm&quot;><span class=&qu
ot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot;></span><span
class=&quot;flat_btn_content&quot;>Delete review &amp;amp; rating</span></butto
n></div>" data-notify_personalization="<p class=&quot;confirm_text&quot;>We&amp;
#39;ve curated titles we think you&amp;#39;ll love.</p><div class=&quot;actions&
quot;><button class=&quot;ok_btn flat_btn&quot; data-track=&quot;confirm&quot;><
span class=&quot;scribd_spinner permanent_rotation&quot; data-size=&quot;30&quot
;></span><span class=&quot;flat_btn_content&quot;>Explore now</span></button></d
iv>" class="confirmation_lightbox_templates"></div></div></div></div><script typ
e="template" id="seo_roadblock_lb_new_basic" data-template="<div id=&quot;seo_ro
adblock_lb_new_basic&quot; data-track_category=&quot;lightbox&quot; class=&quot;
lightbox autogen_class_views_pdfs_seo_lightbox autogen_class_widgets_lightbox au
togen_class_widgets_base seo_lightbox new_basic&quot; style=&quot;display: none;
&quot; aria-labelledby=&quot;main_heading&quot; role=&quot;dialog&quot; tabIndex
=&quot;-1&quot;><div class=&quot;wrapper&quot;><button class=&quot;close_button&
quot; type=&quot;button&quot;><span class=&quot;icon-ic_close&quot;></span><span
class=&quot;visually_hidden&quot;>Close Dialog</span></button><div class=&quot;
content&quot;><div class=&quot;inline_flash&quot;></div><div class=&quot;header&
quot;><h1>Join the membership<br>for readers</h1><h2>Get monthly access to books
, audiobooks, documents, <br />and more</h2><button class=&quot;start_trial_btn
flat_btn&quot;><span class=&quot;scribd_spinner permanent_rotation&quot; data-si
ze=&quot;30&quot;></span><span class=&quot;flat_btn_content&quot;>Read Free for
30 Days</span></button></div><div class=&quot;overlay&quot;><div class=&quot;seo
_images&quot;><div class=&quot;thumb is_book&quot; style=&quot;background-image:
url('https://imgv2-1-f.scribdassets.com/img/audiobook/237900491/original/fit_to
_size/76x100/77cca26bbb/1494810783')&quot;><div class=&quot;shadow_overlay&quot;
></div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/237857482/original/fit_to_
size/76x100/fb1e567a16/1494834374')&quot;><div class=&quot;shadow_overlay&quot;>
</div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image: u
rl('https://imgv2-1-f.scribdassets.com/img/audiobook/320128164/original/fit_to_s
ize/76x100/579f635903/1494817785')&quot;><div class=&quot;shadow_overlay&quot;><
/div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image: ur
l('https://imgv2-1-f.scribdassets.com/img/word_document/221042260/original/fit_t
o_size/76x100/5588d136e9/1494881704')&quot;><div class=&quot;shadow_overlay&quot
;></div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/257846344/original/fit_to
_size/76x100/7895081ac3/1494850970')&quot;><div class=&quot;shadow_overlay&quot;
></div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image:
url('https://imgv2-2-f.scribdassets.com/img/audiobook/281637763/original/fit_to_
size/76x100/bd1ea869ea/1494881704')&quot;><div class=&quot;shadow_overlay&quot;>
</div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image: u
rl('https://imgv2-2-f.scribdassets.com/img/word_document/224251604/original/fit_
to_size/76x100/f9e630bf5e/1494412120')&quot;><div class=&quot;shadow_overlay&quo
t;></div></div><div class=&quot;thumb is_book&quot; style=&quot;background-image
: url('https://imgv2-1-f.scribdassets.com/img/word_document/163638913/original/f
it_to_size/76x100/fa0fba5bf1/1494479035')&quot;><div class=&quot;shadow_overlay&
quot;></div></div><div class=&quot;thumb is_book&quot; style=&quot;background-im
age: url('https://imgv2-1-f.scribdassets.com/img/word_document/244157917/origina
l/fit_to_size/76x100/e54bb446c6/1494538317')&quot;><div class=&quot;shadow_overl
ay&quot;></div></div></div></div><div class=&quot;footer&quot;><div class=&quot;
seo_perks&quot;><span class=&quot;perk&quot;><span class=&quot;icon icon-ic_hear
t&quot;></span>Discover new books</span><span class=&quot;perk&quot;><span class
=&quot;icon icon-ic_star_small_outline&quot;></span>Read everywhere</span><span
class=&quot;perk&quot;><span class=&quot;icon icon-ic_thumbsup_fill_small&quot;>
</span>Build your digital reading lists</span></div><div class=&quot;devices&quo
t;></div></div></div></div></div>"></script><div id="reading_progress_external_p
rogress_lightbox" data-track_category="lightbox" class="lightbox autogen_class_v
iews_shared_reading_progress_external_progress_lightbox autogen_class_widgets_li
ghtbox autogen_class_widgets_base" style="display: none;" aria-labelledby="main_
heading" role="dialog" tabIndex="-1"><div class="wrapper"><button class="close_b
utton" type="button"><span class="icon-ic_close"></span><span class="visually_hi
dden">Close Dialog</span></button><div class="content"><div class="inline_flash"
></div><p>We've moved you to where you read on your <span class='device_name'>ot
her device</span>.</p></div></div></div><div id="past_preview_progress_lightbox"
data-track_category="lightbox" class="lightbox autogen_class_views_shared_readi
ng_progress_past_preview_lightbox autogen_class_widgets_lightbox autogen_class_w
idgets_base" style="display: none;" aria-labelledby="main_heading" role="dialog"
tabIndex="-1"><div class="wrapper"><button class="close_button" type="button"><
span class="icon-ic_close"></span><span class="visually_hidden">Close Dialog</sp
an></button><div class="title">Get the full title to continue</div><div class="c
ontent"><div class="inline_flash"></div><p>Get the full title to continue readin
g from where you left off, or restart the preview.</p><div class="actions"><butt
on class="restart_preview outline_btn flat_btn"><span class="scribd_spinner perm
anent_rotation" data-size="30"></span><span class="flat_btn_content">Restart pre
view</span></button><span class="get_full_title"><span class="react_mount_node"
id="autogen_id_341321886"><div class="library_button"></div></span></span></div>
</div></div></div></div><script type="text/javascript">Scribd.Lightbox.initializ
e();</script><div id="pageboxes"></div><div class="autogen_class_views_shared_ho
vercards autogen_class_widgets_base" id="autogen_id_341340612"><div class="hover
card_drop has_document_cells"></div><script id="tpl_document_hovercard" type="te
mplate"><div class="autogen_class_views_shared_hovercards_document hovercard aut
ogen_class_widgets_base" data-track_category="[&quot;hovercard&quot;,&quot;{{ tr
ack_page_name }}&quot;]" data-object_id="{{ id }}"><div class="hovercard_backgro
und"></div><div class="hovercard_content"><a class="inherit_tracking doc_link" h
ref="{{ url }}"><div class="doc_title hovercard_title above_cover" data-track="t
itle">{{ title }}</div><div class="cover_drop document_cell inherit_tracking" da
ta-track="cover"></div></a><div class="below_cover"><div class="document_data">{
[ if (!is_document) { ]}<div class="star_ratings_row data_row react_mount_node">
</div>{[ } ]}{[ if (is_article || is_issue) { ]}<div class="publisher">from <a c
lass="inherit_tracking" href="{{ publication.url }}" data-track="publication">{{
publication.name }}</a></div>{[ } else { ]}{[ if (typeof authors !== 'undefined
' && authors.length) { ]}<div class="publisher_row authors_row data_row">{[ if (
!is_document) { ]}by {[ } else { ]}uploaded by {[ } ]}{[ for (var i=0; i < autho
rs.length; i++) { ]}{[ if (i > 0) { ]}, {[ } ]}<a class="author inherit_tracking
" data-track="author" href="{{ authors[i].url }}">{{ authors[i].name }}</a>{[ }
]}</div>{[ } else { ]}<div class="publisher_row data_row"><a class="inherit_trac
king" href="{{ publisher.url }}" data-track="publisher">{{ publisher.name }}</a>
</div>{[ } ]}{[ } ]}<div class="page_count">{{ length }}</div></div>{[ if (typeo
f download_url !== undefined && download_url) { ]}<button class="download_btn in
herit_tracking slim flat_btn"><span class="scribd_spinner permanent_rotation" da
ta-size="30"></span><span class="flat_btn_content">Download</span></button>{[ }
]}<div class="library_button_container react_mount_node"></div></div></div></div
></script><script id="tpl_collection_hovercard" type="template"><div class="auto
gen_class_views_shared_hovercards_collection hovercard autogen_class_widgets_bas
e" data-track_category="hovercard"><div class="hovercard_background"></div><div
class="hovercard_content"><div class="collection_title hovercard_title above_cov
er"><a href="{{ url }}">{{ title }}</a></div><a href="{{ url }}"><div class="cov
er_drop collection_cell"></div></a><div class="below_cover"><div class="collecti
on_data"><div>List</div><div class="item_count">{{ formatted_count }}</div></div
><a href="{{ url }}" class="view_collection_btn flat_btn"><span class="scribd_sp
inner permanent_rotation" data-size="30"></span><span class="flat_btn_content">V
iew List</span></a></div></div></div></script></div><div id="fb-root"></div>
<script type="text/javascript">
Scribd.Facebook.setup()
</script><script src="https://apis.google.com/js/platform.js?onload=googleOnLoad
" async="1" defer="1"></script><script type="text/javascript" src="//static.crit
eo.net/js/ld/ld.js" async="true"></script><script type="text/javascript">Scribd.
TranslationsAggregator.aggregate();
new Scribd.ReadingProgress.ExternalProgressLightbox(reading_progress_exter
nal_progress_lightbox, {"track_page":"pdfs"});

Scribd.R.render(Scribd.R.Shared.React.LibraryButton({"actions_select":fals
e,"audiobook_sample_url":null,"check_in_collection_url":"https://www.scribd.com/
book-preview/290788315/check_in_collection","credit_lightbox_url":"https://www.s
cribd.com/credit_purchases/credit_lightbox/290788315","credit_restricted":false,
"document_id":290788315,"document_type":"document","event_container_id":null,"ex
tra_button_classes":"","force_get_full_title":true,"free_trial_url":"/archive/pm
p_checkout?doc=290788315\u0026metadata=%7B%22context%22%3A%22pmp%22%2C%22page%22
%3A%22read%22%2C%22action%22%3A%22start_trial%22%2C%22logged_in%22%3Atrue%2C%22p
latform%22%3A%22web%22%7D","in_player":false,"is_series_canonical":false,"orient
ation":"auto","page":"read","params":{},"paused":false,"show_get_full_title":tru
e,"show_preview":true,"start_reading_url":"https://www.scribd.com/document/29078
8315/Notes-for-Presentation-Malware","subscriber":false,"get_title_text":"Get Fu
ll Title","item":{"id":290788315,"in_library":true},"lists":{"collections":[],"c
ount":0,"create_list_url":"https://www.scribd.com/document_collections","load_mo
re_url":"https://www.scribd.com/saved/lists/2"},"is_mobile":false,"app_button_pr
ops":{"app_url":null,"store_url":"https://itunes.apple.com/us/app/scribd-million
s-books-audiobooks/id542557212?mt=8\u0026pt=298534","track_url":"https://www.scr
ibd.com/mobile/app/document_roadblock","document_id":290788315,"classes":"app_bt
n","cta":"Read preview"}}), $("#autogen_id_341321886")[0]);

new Scribd.ReadingProgress.PastPreviewLightbox(past_preview_progress_light
box, {"credit_restricted":false,"track_page":"books"});

Scribd.R.render(Scribd.R.Shared.React.Upvotes({"doc_id":290788315,"user_ra
ting":null,"rating_count":0,"ratings_path":"https://www.scribd.com/ratings.json?
word_document_id=290788315","upvote_count":0,"downvote_count":0,"score":0.0,"vie
ws":"4","active":true,"show_stats":true}), $("#autogen_id_341327615")[0]);

Scribd.R.render(Scribd.R.Shared.React.LibraryButton({"actions_select":true
,"audiobook_sample_url":null,"check_in_collection_url":"https://www.scribd.com/b
ook-preview/290788315/check_in_collection","credit_lightbox_url":"https://www.sc
ribd.com/credit_purchases/credit_lightbox/290788315","credit_restricted":false,"
document_id":290788315,"document_type":"document","event_container_id":null,"ext
ra_button_classes":"outline_btn","force_get_full_title":false,"free_trial_url":n
ull,"in_player":false,"is_series_canonical":false,"orientation":"bottom","page":
null,"params":{},"paused":false,"show_get_full_title":true,"show_preview":false,
"start_reading_url":"https://www.scribd.com/document/290788315/Notes-for-Present
ation-Malware","subscriber":false,"get_title_text":"Get Full Title","item":{"id"
:290788315,"in_library":true},"lists":{"collections":[],"count":0,"create_list_u
rl":"https://www.scribd.com/document_collections","load_more_url":"https://www.s
cribd.com/saved/lists/2"},"is_mobile":false,"app_button_props":{"app_url":null,"
store_url":"https://itunes.apple.com/us/app/scribd-millions-books-audiobooks/id5
42557212?mt=8\u0026pt=298534","track_url":"https://www.scribd.com/mobile/app/doc
ument_roadblock","document_id":290788315,"classes":"app_btn","cta":"Read preview
"}}), $("#autogen_id_341324130")[0]);

new Scribd.PdfsSidebar("#autogen_id_341326497", {side: "left"});

new Scribd.Popover("#autogen_id_341312299", {"event":"click","direction":"


top","offset":{"top":0,"left":0}});
new Scribd.LanguageSelector("#autogen_id_341315198");
new Scribd.Footer("#global_footer")
new Scribd.Upvote("#autogen_id_341313585", {"ratings_path":"https://www.sc
ribd.com/ratings.json?word_document_id=290788315","doc_id":290788315});

Scribd.pdfs_show = new Scribd.PdfsShow("#autogen_id_341323444", {"data_url


":["h","t","t","p","s",":","/","/","w","w","w",".","s","c","r","i","b","d",".","
c","o","m","/","r","e","a","d","2","/","d","a","t","a","?","i","d","=","2","9","
0","7","8","8","3","1","5"],"pmp_data":false,"pingback_url":["h","t","t","p","s"
,":","/","/","w","w","w",".","s","c","r","i","b","d",".","c","o","m","/","d","o"
,"c","u","m","e","n","t","s","/","2","9","0","7","8","8","3","1","5","/","p","i"
,"n","g","b","a","c","k"],"view_restricted":false,"document":{"id":290788315,"is
_downloadable":true,"toolbar":{"search_url":"/search-4gen?allowed_pages=\u0026au
th_token=wP3QlJGOnOZ1ONnQeZ9U64BtePE%3D\u0026authenticity_token=X0oDFTAY5Nsbvqch
xBszcPMc%2FpJJoY1yCZkxGr93VH4%3D\u0026expires=1495529283\u0026wordDocumentId=290
788315\u0026wordUploadId=295927839","sections":null},"total_pages":5,"download_u
rl":"/read/download_dialog?id=290788315\u0026template=pdfs"}});

Scribd.R.render(Scribd.R.Shared.React.SearchInput({"focused":false,"query"
:null,"redirect_to_app":true,"keep_suggester_on_blur":false}), $("#autogen_id_34
1316533")[0]);

Scribd.R.render(Scribd.R.Shared.React.SearchInput({"focused":false,"query"
:null,"redirect_to_app":true,"keep_suggester_on_blur":true}), $("#autogen_id_341
337306")[0]);
new Scribd.Header("#global_header", {"default_content_pool_id":10});

if (!Scribd.is_mobile) {
Scribd.BookPreview.bind_links("read2:show");
}

new Scribd.Hovercards("#autogen_id_341340612", {"source_page":"read2:show"


})
$(document.body).addClass("jsblock_done"); Scribd.jsblock.resolve();$(document.b
ody).track_rats("page:view");</script>
<script type="text/javascript" id="inspectletjs">
window.__insp = window.__insp || [];
(function() {
var jar = new CookieJar({
expires: "",
path: "/",
});
var state = jar.get("s:insp");
if (state) {
if (state == "0") return;
} else {
var in_test = Math.random() < 0.5;
jar.put("s:insp", in_test ? "1" : "0");
if (!in_test) return
}
__insp.push(['wid', 361314027]);
(function() {
function __ldinsp(){var insp = document.createElement('script'); insp.ty
pe = 'text/javascript'; insp.async = true; insp.id = "inspsync"; insp.src = ('ht
tps:' == document.location.protocol ? 'https' : 'http') + '://cdn.inspectlet.com
/inspectlet.js'; var x = document.getElementsByTagName('script')[0]; x.parentNod
e.insertBefore(insp, x); }
if (window.attachEvent) window.attachEvent('onload', __ldinsp);
else window.addEventListener('load', __ldinsp, false);
})();
})();
</script>
<script type="text/javascript">
__insp.push(['identify', "358063782"]);
__insp.push(['tagSession', {"subscriber":false,"email":"hael.asus@gmai
l.com"}]);
</script>
<script type="text/javascript">
var _user_id = "358063782";
var _session_id = "401ec340-9cf6-0134-8992-0025902de78c";
var _sift = window._sift = window._sift || [];
_sift.push(['_setAccount', "cbcb9f556a"]);
_sift.push(['_setUserId', _user_id]);
_sift.push(['_setSessionId', _session_id]);
_sift.push(['_trackPageview']);
(function() {
function ls() {
var e = document.createElement('script');
e.src = 'https://cdn.siftscience.com/s.js';
document.body.appendChild(e);
}
if (window.attachEvent) {
window.attachEvent('onload', ls);
} else {
window.addEventListener('load', ls, false);
}
})();
</script>
<div style="height: 0; overflow: hidden">
<script>
!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq
=n;
n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.asy
nc=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(win
dow,
document,'script','//connect.facebook.net/en_US/fbevents.js');
fbq('init', '287045611447707');
fbq('track', "PageView");
</script>
<noscript><img height="1" width="1" style="display:none"
src="https://www.facebook.com/tr?id=287045611447707&ev=PageView&noscript=1
"
/></noscript>
</div></body></html>

Das könnte Ihnen auch gefallen