Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyw...
Saved in:
| Main Authors: | Ligh, Michael Hale (Author), Adair, Steven (Author), Hartstein, Blake (Author), Richard, Matthew (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley Publishing Inc.
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Visible analyst operation manual version 7.5
Published: (2000)
Published: (2000)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, Michael A.
Published: (2010)
by: Davis, Michael A.
Published: (2010)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Java cookbook solutions and examples for Java developers
by: Darwin, Ian F.
Published: (2014)
by: Darwin, Ian F.
Published: (2014)
Web catalog cookbook
by: Allen
Published: (1997)
by: Allen
Published: (1997)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
CASE using software development tools
by: Fisher
Published: (1991)
by: Fisher
Published: (1991)
Guide to graphics software tools
by: Chen, Jim X.
Published: (2008)
by: Chen, Jim X.
Published: (2008)
MySQL cookbook
by: DuBois, Paul
Published: (2014)
by: DuBois, Paul
Published: (2014)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
Software testing and analysis process, principles and techniques
by: Pezze
Published: (2008)
by: Pezze
Published: (2008)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Verification validation and testing in software engineering
Published: (2007)
Published: (2007)
The super analysts conversations with the world's leading stock market investors and analysts
by: Leeming
by: Leeming
Software requirment & specifications a lexicon of practice, principles and prejudices
by: Jackson, Michael (Michael James)
Published: (1995)
by: Jackson, Michael (Michael James)
Published: (1995)
Adventures in coding
by: Holland, Eva, et al.
Published: (2016)
by: Holland, Eva, et al.
Published: (2016)
JavaScript cookbook programming the web
by: Powers, Shelley
Published: (2015)
by: Powers, Shelley
Published: (2015)
Model-driven engineering of information systems principles, techniques and practice
Published: (2015)
Published: (2015)
Foundations of software testing fundamental algorithms and techniques
by: Mathur, Aditya P.
Published: (2008)
by: Mathur, Aditya P.
Published: (2008)
A framework of determining the malware factor of suspicious files based on its behaviours
by: Nur Shamimi Che Anuar
Published: (2015)
by: Nur Shamimi Che Anuar
Published: (2015)
Computer and information systems with hands-on software tutorials
by: Szymanski
Published: (1995)
by: Szymanski
Published: (1995)
Computers & information systems
by: Szymanski
Published: (1994)
by: Szymanski
Published: (1994)
Introduction to computers and software
by: Szymanski
Published: (1996)
by: Szymanski
Published: (1996)
Computer currents
by: BeekmanlhGeorge
by: BeekmanlhGeorge
Guide to advanced software testing
by: Hass, Anne Mette Jonassen
Published: (2014)
by: Hass, Anne Mette Jonassen
Published: (2014)
Corel Draw 11 step by step
by: Palani Murugappan
Published: (2004)
by: Palani Murugappan
Published: (2004)
New trends in software methodologies, tools and techniques
Published: (2016)
Published: (2016)
Measurement as a powerful software management tool
by: Ashley
Published: (1995)
by: Ashley
Published: (1995)
Practical activities for computer enrichment
Published: (1998)
Published: (1998)
Herb Schildt's C++ programming cookbook
by: Schild, Herbert
Published: (2008)
by: Schild, Herbert
Published: (2008)
Software Test Automation effection use of test execution tools
by: FewsterlhMark
Published: (1999)
by: FewsterlhMark
Published: (1999)
Toward zero-defect programming
by: Stavely, Allan M
Published: (1999)
by: Stavely, Allan M
Published: (1999)
Similar Items
-
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012) -
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014) -
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014) -
Visible analyst operation manual version 7.5
Published: (2000) -
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)


