語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Malware analysis and detection engin...
~
Mohanta, Abhijit.
FindBook
Google Book
Amazon
博客來
Malware analysis and detection engineering = a comprehensive approach to detect and analyze modern malware /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Malware analysis and detection engineering/ by Abhijit Mohanta, Anoop Saldanha.
其他題名:
a comprehensive approach to detect and analyze modern malware /
作者:
Mohanta, Abhijit.
其他作者:
Saldanha, Anoop.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xxxiv, 914 p. :ill., digital ;24 cm.
內容註:
Part 1: Introduction -- Chapter 1. Introduction -- Chapter 2. Malware Analysis Lab Setup -- Part 2: OS and System Fundamentals -- Chapter 3. File and File Formats -- Chapter 4. Virtual Memory and the Portable Executable (PE) File -- Chapter 5. Windows Internals -- Part 3: Malware Components and Analysis -- Chapter 6. Malware Components and Distribution -- Chapter 7. Malware Packers -- Chapter 8. Persistence Mechanisms -- Chapter 9. Network Communication -- Chapter 10. Code Injection, Process Hollowing, and API Hooking -- Chapter 11. Stealth and Rootkits -- Part 4: Malware Analysis and Classification -- Chapter 12. Static Analysis -- Chapter 13. Dynamic Analysis -- Chapter 14. Memory Forensics With Volatility -- Chapter 15. Malware Payload Dissection and Classification -- Part 5: Malware Reverse Engineering -- Chapter 16. Debuggers and Assembly Language -- Chapter 17. Debugging Tricks for Unpacking Malware -- Chapter 18. Debugging Code Injection -- Chapter 19. Armoring and Evasion - The Anti Techniques -- Chapter 20. File-less, Macros, and Other Malware Trends -- Part 6: Detection Engineering -- Chapter 21. Dev Analysis Lab Setup -- Chapter 22. Anti-Virus Engines -- Chapter 23. IDS/IPS and Snort/Suricata Rule Writing -- Chapter 24. Malware Sandbox Internals -- Chapter 25. Binary Instrumentation for Reversing Automation.
Contained By:
Springer Nature eBook
標題:
Malware (Computer software) -
電子資源:
https://doi.org/10.1007/978-1-4842-6193-4
ISBN:
9781484261934
Malware analysis and detection engineering = a comprehensive approach to detect and analyze modern malware /
Mohanta, Abhijit.
Malware analysis and detection engineering
a comprehensive approach to detect and analyze modern malware /[electronic resource] :by Abhijit Mohanta, Anoop Saldanha. - Berkeley, CA :Apress :2020. - xxxiv, 914 p. :ill., digital ;24 cm.
Part 1: Introduction -- Chapter 1. Introduction -- Chapter 2. Malware Analysis Lab Setup -- Part 2: OS and System Fundamentals -- Chapter 3. File and File Formats -- Chapter 4. Virtual Memory and the Portable Executable (PE) File -- Chapter 5. Windows Internals -- Part 3: Malware Components and Analysis -- Chapter 6. Malware Components and Distribution -- Chapter 7. Malware Packers -- Chapter 8. Persistence Mechanisms -- Chapter 9. Network Communication -- Chapter 10. Code Injection, Process Hollowing, and API Hooking -- Chapter 11. Stealth and Rootkits -- Part 4: Malware Analysis and Classification -- Chapter 12. Static Analysis -- Chapter 13. Dynamic Analysis -- Chapter 14. Memory Forensics With Volatility -- Chapter 15. Malware Payload Dissection and Classification -- Part 5: Malware Reverse Engineering -- Chapter 16. Debuggers and Assembly Language -- Chapter 17. Debugging Tricks for Unpacking Malware -- Chapter 18. Debugging Code Injection -- Chapter 19. Armoring and Evasion - The Anti Techniques -- Chapter 20. File-less, Macros, and Other Malware Trends -- Part 6: Detection Engineering -- Chapter 21. Dev Analysis Lab Setup -- Chapter 22. Anti-Virus Engines -- Chapter 23. IDS/IPS and Snort/Suricata Rule Writing -- Chapter 24. Malware Sandbox Internals -- Chapter 25. Binary Instrumentation for Reversing Automation.
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. You will: Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative.
ISBN: 9781484261934
Standard No.: 10.1007/978-1-4842-6193-4doiSubjects--Topical Terms:
1458432
Malware (Computer software)
LC Class. No.: QA76.76.C68 / M35 2020
Dewey Class. No.: 005.8
Malware analysis and detection engineering = a comprehensive approach to detect and analyze modern malware /
LDR
:04481nmm a2200337 a 4500
001
2244022
003
DE-He213
005
20210201103110.0
006
m d
007
cr nn 008maaau
008
211207s2020 cau s 0 eng d
020
$a
9781484261934
$q
(electronic bk.)
020
$a
9781484261927
$q
(paper)
024
7
$a
10.1007/978-1-4842-6193-4
$2
doi
035
$a
978-1-4842-6193-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.C68
$b
M35 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.76.C68
$b
M697 2020
100
1
$a
Mohanta, Abhijit.
$3
3504547
245
1 0
$a
Malware analysis and detection engineering
$h
[electronic resource] :
$b
a comprehensive approach to detect and analyze modern malware /
$c
by Abhijit Mohanta, Anoop Saldanha.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxxiv, 914 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part 1: Introduction -- Chapter 1. Introduction -- Chapter 2. Malware Analysis Lab Setup -- Part 2: OS and System Fundamentals -- Chapter 3. File and File Formats -- Chapter 4. Virtual Memory and the Portable Executable (PE) File -- Chapter 5. Windows Internals -- Part 3: Malware Components and Analysis -- Chapter 6. Malware Components and Distribution -- Chapter 7. Malware Packers -- Chapter 8. Persistence Mechanisms -- Chapter 9. Network Communication -- Chapter 10. Code Injection, Process Hollowing, and API Hooking -- Chapter 11. Stealth and Rootkits -- Part 4: Malware Analysis and Classification -- Chapter 12. Static Analysis -- Chapter 13. Dynamic Analysis -- Chapter 14. Memory Forensics With Volatility -- Chapter 15. Malware Payload Dissection and Classification -- Part 5: Malware Reverse Engineering -- Chapter 16. Debuggers and Assembly Language -- Chapter 17. Debugging Tricks for Unpacking Malware -- Chapter 18. Debugging Code Injection -- Chapter 19. Armoring and Evasion - The Anti Techniques -- Chapter 20. File-less, Macros, and Other Malware Trends -- Part 6: Detection Engineering -- Chapter 21. Dev Analysis Lab Setup -- Chapter 22. Anti-Virus Engines -- Chapter 23. IDS/IPS and Snort/Suricata Rule Writing -- Chapter 24. Malware Sandbox Internals -- Chapter 25. Binary Instrumentation for Reversing Automation.
520
$a
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. You will: Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative.
650
0
$a
Malware (Computer software)
$3
1458432
650
0
$a
Computer security.
$3
540555
650
0
$a
Computer networks.
$3
539554
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer Applications.
$3
891249
700
1
$a
Saldanha, Anoop.
$3
3504548
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6193-4
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9405068
電子資源
11.線上閱覽_V
電子書
EB QA76.76.C68 M35 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入