gogo
Amazon cover image
Image from Amazon.com

Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.].

Contributor(s): Material type: TextTextPublication details: Indianapolis, Ind. : Wiley, c2011.Description: xxvi, 716 p. : ill. ; 24 cm. + 1 computer optical discISBN:
  • 9780470613030:
  • 9781118003367:
  • 9781118008294:
  • 9781118008300:
  • 0470613033
Subject(s): Genre/Form: DDC classification:
  • 005.8
LOC classification:
  • M3 2011
Online resources:
Contents:
Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.
Summary: A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.
List(s) this item appears in: CW227 BSc Cybercrime and IT Security

CW227

Includes index.

Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.

A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.

Powered by Koha