- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 93字
- 2021-06-24 12:29:03
How it works…
As you can observe, in Step 1, we copied several YARA rules. The first rule checks the magic numbers of a file to see if they match those of a PDF. The other two rules are trivial rules—one that matches every file, and one that matches no file. Then, in Step 2, we used the YARA program to run the rules against the target file. We saw from a printout that the file matched some rules but not others, as expected from an effective YARA ruleset.
推薦閱讀
- Project 2007項目管理實用詳解
- 我的J2EE成功之路
- Visualforce Development Cookbook(Second Edition)
- 3D Printing with RepRap Cookbook
- Managing Mission:Critical Domains and DNS
- 計算機原理
- 小型電動機實用設計手冊
- 大數據挑戰與NoSQL數據庫技術
- Maya 2012從入門到精通
- Creo Parametric 1.0中文版從入門到精通
- 悟透AutoCAD 2009完全自學手冊
- Mastering pfSense
- 企業級Web開發實戰
- Microsoft System Center Data Protection Manager Cookbook
- Learning Couchbase