Internet Technologies Review
Reverse Engineering Malware Binary Obfuscation and Protection
T-110.6220 Unpacking and decrypting malware
Exercise 3, Security models, X.509 and PKI
Vaskelainen-paper-final.pdf
SOAP and UDDI
NFC exercise.pdf
Cloud Frameworks
Backbone network technologies
Access Control and Security Policy Models
Windows access control
T-110.4100 Tietokoneverkot
Malware Analysis Automation
Course Introduction & Logistics
Assignment 2 info
Publish/Subscribe Internetworking
BitTorrent and CoolStreaming
Scalable Cloud Computing
T-109.4300 Network Services Business Models
Lecture 5 Network security, TKK, Nov 2008 1
P2PSIP, ICE, WebRTC, anD SIP Extensions
Lecture 7 Network security, TKK, Nov 2008
T-110.5140 NAF & XML SOAP and UDDI
Research tools