Malware Analysis and Defeating using Virtual Machines Malware Analysis: A Hybrid Approach Reverse Engineering Malware - A Practical Guide Introduction to Malware Detection and Reverse Engineering Psychological and emotional manipulation Which Social Network Should I Post To?