Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. You will: Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative.
Malware (Software) --- Seguridad informática --- Redes computacionales --- Ciberseguridad --- Informática --- Ordenadores --- Sistemas informáticos --- Bases de datos --- Redes informáticas --- Piratas informáticos --- Protección de datos --- Recuperación de datos (Informática) --- Criptografía (Informática) --- Infraestructuras críticas (Seguridad informática) --- Sistemas de seguridad --- Tests de intrusión (Seguridad informática) --- Medidas de seguridad --- Control de acceso
Choose an application
Xifratge (Informàtica) --- Criptografia --- Escriptura --- Símbols --- Escriptura secreta --- Protecció de dades --- Seguretat informàtica --- Signatures electròniques --- Generadors de nombres aleatoris --- Nombres primers --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Cryptography. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
Data protection --- Computer science --- Law and legislation. --- Mathematics. --- Computer mathematics --- Electronic data processing --- Mathematics --- Habeas data --- Privacy, Right of --- Xifratge (Informàtica) --- Protecció de dades --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Processament de dades --- Seguretat informàtica --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Signatures electròniques --- Criptografia --- Generadors de nombres aleatoris --- Nombres primers --- Símbols
Listing 1 - 3 of 3 |
Sort by
|