Included will be an overview of defensive-methodologies and processes such as system and network hardening and monitoring, data de-obfuscation, decoding and decryption, static and dynamic analysis of malware code and binaries and forensic best practises. ???'''Download:''' [[File:OWASPIreland-Limerick_20110324 - GoldenRules.pdf]]+<br><br>