Fr. 120.00

Advanced Malware Analysis

Inglese · Tascabile

Spedizione di solito entro 3 a 5 settimane

Descrizione

Ulteriori informazioni

Informationen zum Autor Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark Reading. Klappentext Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you'll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports. A crucial tool for combatting malware-which currently hits each second globallyFilled with undocumented methods for customizing dozens of analysis software tools for very specific usesLeads you through a malware blueprint first, then lab setup, and finally analysis and reporting activitiesEvery tool explained in this book is available in every country around the world Zusammenfassung A one-of-a-kind guide to setting up a state-of-the-art malware research lab! using and customizing dozens of cutting-edge analysis tools! and generating metrics-rich reports to document the findings Inhaltsverzeichnis Part I: Malware Blueprint Chapter 1: Malware Analysis 101 Chapter 2: Malware Taxonomy Chapter 3: Malware Deployment Chapter 4: Protective Mechanisms Chapter 5: Malware Dependencies Part II: Malware Research Lab Chapter 6: Malware Collection Chapter 7: Static Analysis Lab Chapter 8: Dynamic Analysis Lab Part III: Malware Inspection Chapter 9: The Portable Executable File Chapter 10: The Proper Way to Handle Files Chapter 11: Inspecting Static Malware Chapter 12: Inspecting Dynamic Malware Chapter 13: Tools of the Trade Part IV: Appendices Appendix A: Tools List Appendix B: List of Laboratories Appendix C: References ...

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.