gogo
Amazon cover image
Image from Amazon.com

Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.].

Contributor(s): Material type: TextTextPublication details: Indianapolis, Ind. : Wiley, c2011.Description: xxvi, 716 p. : ill. ; 24 cm. + 1 computer optical discISBN:
  • 9780470613030:
  • 9781118003367:
  • 9781118008294:
  • 9781118008300:
  • 0470613033
Subject(s): Genre/Form: DDC classification:
  • 005.8
LOC classification:
  • M3 2011
Online resources:
Contents:
Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.
Summary: A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.
List(s) this item appears in: CW227 BSc Cybercrime and IT Security
Holdings
Item type Current library Call number Copy number Status Date due Barcode
General Lending Carlow Campus Library General Lending 005.8 (Browse shelf(Opens below)) 1 Available 82080

CW227

Includes index.

Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.

A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.

Powered by Koha