๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Malware: Fighting Malicious Code

โœ Scribed by Ed Skoudis, Lenny Zeltser


Publisher
Prentice Hall
Year
2003
Tongue
English
Leaves
672
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Great book explaining all the different types of malware out there. Skoudis helps to understand the technical details of each malware type without going into too much detail. The links provided, altough a few years old, are all still relevant.


๐Ÿ“œ SIMILAR VOLUMES


Malware: Fighting Malicious Code
โœ Ed Skoudis, Lenny Zeltser ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

Keep control of your systems out of the hands of unknown attackersIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degr

Malware: Fighting Malicious Code
โœ Ed Skoudis ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jump

Malware Analyst's Cookbook and DVD: Tool
โœ Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Wiley ๐ŸŒ English

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, ro

Malware Analyst's Cookbook and DVD: Tool
โœ Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Wiley ๐ŸŒ English

A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware

Malware analyst's cookbook and DVD: tool
โœ Ligh, Michael Hale;Richard, Matt;Adair, Steven;Hartstein, Blake ๐Ÿ“‚ Library ๐Ÿ“… 2010;2011 ๐Ÿ› Wiley Publishing ๐ŸŒ English

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, ro

Malware Forensics: Investigating and Ana
โœ Cameron H. Malin, Eoghan Casey, James M. Aquilina ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Syngress ๐ŸŒ English

<i>Malware Forensics: Investigating and Analyzing Malicious Code</i> covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that dis