- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 93字
- 2021-06-24 12:29:03
How it works…
As you can observe, in Step 1, we copied several YARA rules. The first rule checks the magic numbers of a file to see if they match those of a PDF. The other two rules are trivial rules—one that matches every file, and one that matches no file. Then, in Step 2, we used the YARA program to run the rules against the target file. We saw from a printout that the file matched some rules but not others, as expected from an effective YARA ruleset.
推薦閱讀
- Visualforce Development Cookbook(Second Edition)
- Go Machine Learning Projects
- 網(wǎng)絡(luò)服務(wù)器架設(shè)(Windows Server+Linux Server)
- PowerShell 3.0 Advanced Administration Handbook
- 教父母學(xué)會(huì)上網(wǎng)
- Python Data Science Essentials
- Splunk Operational Intelligence Cookbook
- 計(jì)算機(jī)網(wǎng)絡(luò)安全
- 走近大數(shù)據(jù)
- 從零開始學(xué)PHP
- 實(shí)用網(wǎng)絡(luò)流量分析技術(shù)
- HBase Essentials
- Hands-On DevOps
- Hadoop大數(shù)據(jù)開發(fā)基礎(chǔ)
- Hands-On Data Analysis with Scala