0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (87)
  • R500+ (142)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,508 Discovery Miles 15 080 Ships in 18 - 22 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback)
Mohssen Mohammed, Al-Sakib Khan Pathan
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback): Kim Zetter Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback)
Kim Zetter
R455 R420 Discovery Miles 4 200 Save R35 (8%) Ships in 5 - 10 working days
Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.): Mark Pearce Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.)
Mark Pearce
R1,288 R1,091 Discovery Miles 10 910 Save R197 (15%) Ships in 18 - 22 working days

Visual Studio .NET, and more specifically, Visual Basic .NET give developers more productivity and more power to develop applications, but at the cost of a complex development environment together with a whole new set of potential bugs. This text analyses the new defect types that arise with VB .NET, and investigates the debugging of every type of VB .NET application together with many common debugging scenarios. Mark Pearce also shows developers how to use the powerful new .NET debugging tools to find bugs wherever they hide, even deep inside distributed applications.

Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13,... Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings (Paperback, 2002 ed.)
Stuart Anderson, Sandro Bologna, Massimo Felici
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002.The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

A Pathology of Computer Viruses (Paperback, Edition. ed.): David Ferbrache A Pathology of Computer Viruses (Paperback, Edition. ed.)
David Ferbrache
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.

Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,132 R1,759 Discovery Miles 17 590 Save R373 (17%) Ships in 18 - 22 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback): Andy Greenberg Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback)
Andy Greenberg
R452 R393 Discovery Miles 3 930 Save R59 (13%) Ships in 18 - 22 working days

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.

"Much more than a true-life techno-thriller ... a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." —Los Angeles Times

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,059 Discovery Miles 10 590 Ships in 10 - 15 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R453 R345 Discovery Miles 3 450 Save R108 (24%) Ships in 10 - 15 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and... Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and applications (Paperback, 3rd Revised edition)
Jose Manuel Ortega
R1,123 Discovery Miles 11 230 Ships in 18 - 22 working days

Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application Key Features * Discover security techniques to protect your network and systems using Python 3.10 * Create scripts in Python to automate security and pentesting tasks * Analyze network traffic in a network and extract information using Python 3.10 Book Description Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture. The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts. The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks. By the end of this book, you will be able to make the most of Python to test the security of your network and applications. What you will learn * Create scripts in Python to automate security and pentesting tasks * Program your own tools in Python that can be used in a Network Security process * Automate tasks of analysis and extraction of information from servers * Detect Server Vulnerabilities and analyze security in web applications * Utilize the ssh-audit tool to check the security in SSH servers * Explore WriteHat as a pentesting reports tool written in Python * Automate the process of detecting vulnerabilities in applications with tools like Fuxploider Who This Book Is For This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite.

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,028 Discovery Miles 30 280 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Computer Viruses for Dummies (Paperback, New): Ph Gregory Computer Viruses for Dummies (Paperback, New)
Ph Gregory
R293 R255 Discovery Miles 2 550 Save R38 (13%) Ships in 10 - 15 working days

Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. "Computer Viruses For Dummies" helps you: Understand the risks and analyze your PC's current conditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it's already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and when you're surfing the Net

Written by Peter H. Gregory, coauthor of "CISSP For Dummies" and "Security + For Dummies," "Computer Viruses For Dummies" goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Wireless Hacking With Kali Linux - Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and... Wireless Hacking With Kali Linux - Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and Implementation Guide (2022 Crash Course for Beginners) (Paperback)
Eugene Delgado
R730 R639 Discovery Miles 6 390 Save R91 (12%) Ships in 18 - 22 working days
Assembly Language Laboratory Work (Paperback): Marius Silaghi Assembly Language Laboratory Work (Paperback)
Marius Silaghi
R532 Discovery Miles 5 320 Ships in 18 - 22 working days
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,565 Discovery Miles 25 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R504 Discovery Miles 5 040 Ships in 18 - 22 working days
Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield... Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield advantage (Paperback)
Johann Rehberger
R1,141 Discovery Miles 11 410 Ships in 18 - 22 working days

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Cybersecurity for Beginners - What You Must Know about Cybersecurity (Paperback): Attila Kovacs Cybersecurity for Beginners - What You Must Know about Cybersecurity (Paperback)
Attila Kovacs
R552 R502 Discovery Miles 5 020 Save R50 (9%) Ships in 18 - 22 working days
Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete... Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Comprehensive Beginner's Guide to Take Control of (Paperback)
Miles Price
R661 Discovery Miles 6 610 Ships in 18 - 22 working days
Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,299 Discovery Miles 12 990 Ships in 18 - 22 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback): G. Held Bulletproofing TCP/IP-based Windows NT/2000 Networks (Paperback)
G. Held
R3,060 Discovery Miles 30 600 Ships in 10 - 15 working days

Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.

  • Covers how TCP/IP operates and how TCP/IP attacks occur.
  • Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods.
  • Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
  • Uses practical real-world examples of methods used to block potential attacks.
Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.

Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R887 Discovery Miles 8 870 Ships in 9 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, … Paperback R1,109 R1,049 Discovery Miles 10 490
Herbal Bioactive-Based Drug Delivery…
Inderbir Singh Bakshi, Rajni Bala, … Paperback R3,967 Discovery Miles 39 670
Understanding the Internet - A Glimpse…
Kevin Curran Paperback R1,647 Discovery Miles 16 470
Introduction To Legal Pluralism In South…
C. Rautenbach Paperback  (1)
R1,274 R1,150 Discovery Miles 11 500
Experimental Learning in Production…
Riitta Smeds, J. Smeds Hardcover R2,746 Discovery Miles 27 460
Total Quality Management and Operational…
John S Oakland, Michael A. Turner, … Paperback R1,175 R1,112 Discovery Miles 11 120
Dynamic Control of Quality in…
David D. Yao, Shaohui Zheng Hardcover R1,419 Discovery Miles 14 190
Stochastic Processes: Modeling and…
D.N. Shanbhag Hardcover R3,913 Discovery Miles 39 130
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R317 Discovery Miles 3 170
Maximum Entropy and Bayesian Methods…
G. Erickson, Joshua T. Rychert, … Hardcover R4,177 Discovery Miles 41 770

 

Partners