Advanced Malware Analysis
Autor Christopher Elisanen Limba Engleză Paperback – 16 aug 2015
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you’ll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports.
- A crucial tool for combatting malware—which currently hits each second globally
- Filled with undocumented methods for customizing dozens of analysis software tools for very specific uses
- Leads you through a malware blueprint first, then lab setup, and finally analysis and reporting activities
- Every tool explained in this book is available in every country around the world
Preț: 372.56 lei
Preț vechi: 515.32 lei
-28% Nou
Puncte Express: 559
Preț estimativ în valută:
71.33€ • 74.28$ • 59.18£
71.33€ • 74.28$ • 59.18£
Carte tipărită la comandă
Livrare economică 13-19 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780071819749
ISBN-10: 0071819746
Pagini: 544
Dimensiuni: 211 x 234 x 28 mm
Greutate: 0.93 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
ISBN-10: 0071819746
Pagini: 544
Dimensiuni: 211 x 234 x 28 mm
Greutate: 0.93 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
Cuprins
Part I: Malware Blueprint
Chapter 1: Malware Analysis 101
Chapter 2: Malware Taxonomy
Chapter 3: Malware Deployment
Chapter 4: Protective Mechanisms
Chapter 5: Malware Dependencies
Part II: Malware Research Lab
Chapter 6: Malware Collection
Chapter 7: Static Analysis Lab
Chapter 8: Dynamic Analysis Lab
Part III: Malware Inspection
Chapter 9: The Portable Executable File
Chapter 10: The Proper Way to Handle Files
Chapter 11: Inspecting Static Malware
Chapter 12: Inspecting Dynamic Malware
Chapter 13: Tools of the Trade
Part IV: Appendices
Appendix A: Tools List
Appendix B: List of Laboratories
Appendix C: References
Chapter 1: Malware Analysis 101
Chapter 2: Malware Taxonomy
Chapter 3: Malware Deployment
Chapter 4: Protective Mechanisms
Chapter 5: Malware Dependencies
Part II: Malware Research Lab
Chapter 6: Malware Collection
Chapter 7: Static Analysis Lab
Chapter 8: Dynamic Analysis Lab
Part III: Malware Inspection
Chapter 9: The Portable Executable File
Chapter 10: The Proper Way to Handle Files
Chapter 11: Inspecting Static Malware
Chapter 12: Inspecting Dynamic Malware
Chapter 13: Tools of the Trade
Part IV: Appendices
Appendix A: Tools List
Appendix B: List of Laboratories
Appendix C: References