๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code

โœ Scribed by Ligh, Michael Hale;Richard, Matt;Adair, Steven;Hartstein, Blake


Publisher
Wiley Publishing
Year
2010;2011
Tongue
English
Leaves
744
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutionsCovers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much moreIncludes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions

"Malware Analyst's Cookbook" is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

โœฆ Subjects


Science;Technology;Nonfiction;Computers;Hackers;Computer Science;Technical;Reference;Programming


๐Ÿ“œ SIMILAR VOLUMES


Malware Analyst's Cookbook and DVD: Tool
โœ Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Wiley ๐ŸŒ English

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, ro

Malware Analyst's Cookbook and DVD: Tool
โœ Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Wiley ๐ŸŒ English

A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware

Malware: Fighting Malicious Code
โœ Ed Skoudis, Lenny Zeltser ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English

Great book explaining all the different types of malware out there. Skoudis helps to understand the technical details of each malware type without going into too much detail. The links provided, altough a few years old, are all still relevant.

Malware: Fighting Malicious Code
โœ Ed Skoudis, Lenny Zeltser ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

Keep control of your systems out of the hands of unknown attackersIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degr

Malware: Fighting Malicious Code
โœ Ed Skoudis ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jump

Learning Malware Analysis: Explore the c
โœ Monnappa K A ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

Understand malware analysis and its practical implementation Key Features โ€ข Explore the key concepts of malware analysis and memory forensics using real-world examples โ€ข Learn the art of detecting, analyzing, and investigating malware threats โ€ข Understand adversary tactics and techniques Bo