Malware analyst's cookbook and DVD tools and techniques for fighting malicious code

A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyw...

Full description

Saved in:
Bibliographic Details
Main Authors: Ligh, Michael Hale (Author), Adair, Steven (Author), Hartstein, Blake (Author), Richard, Matthew (Author)
Format: Book
Language:English
Published: Indianapolis, IN Wiley Publishing Inc. 2011
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :QA 76.9.A25 L54 2011

MARC

LEADER 00000nam a2200000 c 4500
001 56219
003 MY-KLNDU
005 20241219015227.0
008 221104 20112011inua | 001 0 eng d
020 |a 9780470613030 
020 |a 0470613033 
020 |z 978118003367 (ebk) 
020 |z 978118008294 (ebk) 
020 |z 978118008300 (ebk) 
039 9 |a 202211041247  |b VLOAD  |c 202009141533  |d dewi  |c 202009141533  |d dewi  |c 202009091614  |d dewi  |y 202006221713  |z faezah 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25  |b L54 2011 
100 1 |a Ligh, Michael Hale  |e author 
245 1 0 |a Malware analyst's cookbook and DVD  |b tools and techniques for fighting malicious code  |c Michael Hale Ligh, Steven Adair, Blake Hartstein and Matthew Richard 
264 1 |a Indianapolis, IN  |b Wiley Publishing Inc.  |c 2011 
264 4 |c ©2011 
300 |a xvi, 716 pages  |b illustrations  |c 24 cm +  |e 1 CD ROM (4 3/4 in) 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a The book is accompanied by 1 CD ROM bearing the same call number and available at the circulation counter 
505 0 |a Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry 
520 |a A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyware, rootkits, adware, and other invasivesoftware 
592 |a 00013953  |b 21/1/2015  |c RM 359.80 (SET)  |h PVK (BL) 
650 0 |a Computer security 
650 0 |a Malware (Computer software) 
700 1 |a Adair, Steven  |e author 
700 1 |a Hartstein, Blake  |e author 
700 1 |a Richard, Matthew  |e author 
999 |a vtls000065626  |c 56219  |d 56219