Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyw...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley Publishing Inc.
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.A25 L54 2011 |
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 56219 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219015227.0 | ||
| 008 | 221104 20112011inua | 001 0 eng d | ||
| 020 | |a 9780470613030 | ||
| 020 | |a 0470613033 | ||
| 020 | |z 978118003367 (ebk) | ||
| 020 | |z 978118008294 (ebk) | ||
| 020 | |z 978118008300 (ebk) | ||
| 039 | 9 | |a 202211041247 |b VLOAD |c 202009141533 |d dewi |c 202009141533 |d dewi |c 202009091614 |d dewi |y 202006221713 |z faezah | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b L54 2011 | ||
| 100 | 1 | |a Ligh, Michael Hale |e author | |
| 245 | 1 | 0 | |a Malware analyst's cookbook and DVD |b tools and techniques for fighting malicious code |c Michael Hale Ligh, Steven Adair, Blake Hartstein and Matthew Richard |
| 264 | 1 | |a Indianapolis, IN |b Wiley Publishing Inc. |c 2011 | |
| 264 | 4 | |c ©2011 | |
| 300 | |a xvi, 716 pages |b illustrations |c 24 cm + |e 1 CD ROM (4 3/4 in) | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a The book is accompanied by 1 CD ROM bearing the same call number and available at the circulation counter | ||
| 505 | 0 | |a Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry | |
| 520 | |a A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyware, rootkits, adware, and other invasivesoftware | ||
| 592 | |a 00013953 |b 21/1/2015 |c RM 359.80 (SET) |h PVK (BL) | ||
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Malware (Computer software) | |
| 700 | 1 | |a Adair, Steven |e author | |
| 700 | 1 | |a Hartstein, Blake |e author | |
| 700 | 1 | |a Richard, Matthew |e author | |
| 999 | |a vtls000065626 |c 56219 |d 56219 | ||


