- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 93字
- 2021-06-24 12:29:03
How it works…
As you can observe, in Step 1, we copied several YARA rules. The first rule checks the magic numbers of a file to see if they match those of a PDF. The other two rules are trivial rules—one that matches every file, and one that matches no file. Then, in Step 2, we used the YARA program to run the rules against the target file. We saw from a printout that the file matched some rules but not others, as expected from an effective YARA ruleset.
推薦閱讀
- Microsoft Power BI Quick Start Guide
- 三菱FX3U/5U PLC從入門到精通
- Maya極速引擎:材質篇
- 四向穿梭式自動化密集倉儲系統的設計與控制
- Android游戲開發案例與關鍵技術
- 大學C/C++語言程序設計基礎
- 信息物理系統(CPS)測試與評價技術
- 水下無線傳感器網絡的通信與決策技術
- Mastering Exploratory Analysis with pandas
- C#求職寶典
- 未來學徒:讀懂人工智能飛馳時代
- TensorFlow Deep Learning Projects
- Mastering Android Game Development with Unity
- Containerization with Ansible 2
- 探索中國物聯網之路