|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Discover how the internals of malware work and how you can analyze
and detect it. You will learn not only how to analyze and reverse
malware, but also how to classify and categorize it, giving you
insight into the intent of the malware. Malware Analysis and
Detection Engineering is a one-stop guide to malware analysis that
simplifies the topic by teaching you undocumented tricks used by
analysts in the industry. You will be able to extend your expertise
to analyze and reverse the challenges that malicious software
throws at you. The book starts with an introduction to malware
analysis and reverse engineering to provide insight on the
different types of malware and also the terminology used in the
anti-malware industry. You will know how to set up an isolated lab
environment to safely execute and analyze malware. You will learn
about malware packing, code injection, and process hollowing plus
how to analyze, reverse, classify, and categorize malware using
static and dynamic tools. You will be able to automate your malware
analysis process by exploring detection tools to modify and trace
malware programs, including sandboxes, IDS/IPS, anti-virus, and
Windows binary instrumentation. The book provides comprehensive
content in combination with hands-on exercises to help you dig into
the details of malware dissection, giving you the confidence to
tackle malware that enters your environment. What You Will Learn
Analyze, dissect, reverse engineer, and classify malware
Effectively handle malware with custom packers and compilers Unpack
complex malware to locate vital malware components and decipher
their intent Use various static and dynamic malware analysis tools
Leverage the internals of various detection engineering tools to
improve your workflow Write Snort rules and learn to use them with
Suricata IDS Who This Book Is For Security professionals, malware
analysts, SOC analysts, incident responders, detection engineers,
reverse engineers, and network security engineers "This book is a
beast! If you're looking to master the ever-widening field of
malware analysis, look no further. This is the definitive guide for
you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and
ZeroDayInitiative
This book provides readers with a valuable reference on cyber
weapons and, in particular, viruses, software and hardware Trojans.
The authors discuss in detail the most dangerous computer viruses,
software Trojans and spyware, models of computer Trojans affecting
computers, methods of implementation and mechanisms of their
interaction with an attacker - a hacker, an intruder or an
intelligence agent. Coverage includes Trojans in electronic
equipment such as telecommunication systems, computers, mobile
communication systems, cars and even consumer electronics. The
evolutionary path of development of hardware Trojans from
"cabinets", "crates" and "boxes" to the microcircuits (IC) is also
discussed. Readers will benefit from the detailed review of the
major known types of hardware Trojans in chips, principles of their
design, mechanisms of their functioning, methods of their
introduction, means of camouflaging and detecting, as well as
methods of protection and counteraction.
 |
Detection of Intrusions and Malware, and Vulnerability Assessment
- 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings
(Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
|
R2,565
Discovery Miles 25 650
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 13th
International Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment, DIMVA 2016, held in San Sebastian,
Spain, in July 2016. The 19 revised full papers and 2 extended
abstracts presented were carefully reviewed and selected from 66
submissions. They present the state of the art in intrusion
detection, malware analysis, and vulnerability assessment, dealing
with novel ideas, techniques, and applications in important areas
of computer security including vulnerability detection, attack
prevention, web security, malware detection and classification,
authentication, data leakage prevention, and countering evasive
techniques such as obfuscation.
Avoid becoming the next ransomware victim by taking practical steps
today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list
of ransomware victims is long, distinguished, and sophisticated.
And it's growing longer every day. In Ransomware Protection
Playbook, computer security veteran and expert penetration tester
Roger A. Grimes delivers an actionable blueprint for organizations
seeking a robust defense against one of the most insidious and
destructive IT threats currently in the wild. You'll learn about
concrete steps you can take now to protect yourself or your
organization from ransomware attacks. In addition to walking you
through the necessary technical preventative measures, this
critical book will show you how to: Quickly detect an attack, limit
the damage, and decide whether to pay the ransom Implement a
pre-set game plan in the event of a game-changing security breach
to help limit the reputational and financial damage Lay down a
secure foundation of cybersecurity insurance and legal protection
to mitigate the disruption to your life and business A must-read
for cyber and information security professionals, privacy leaders,
risk managers, and CTOs, Ransomware Protection Playbook is an
irreplaceable and timely resource for anyone concerned about the
security of their, or their organization's, data.
Explore the fascinating and rich world of Secret Key cryptography!
This book provides practical methods for encrypting messages, an
interesting and entertaining historical perspective, and an
incredible collection of ciphers and codes-including 30 unbreakable
methods. In Secret Key Cryptography: Ciphers, from simple to
unbreakable you will: Measure the strength of your ciphers and
learn how to guarantee their security Construct and incorporate
data-compression codes Generate true random numbers in bulk
Construct huge primes and safe primes Add an undetectable backdoor
to a cipher Defeat hypothetical ultracomputers that could be
developed decades from now Construct 30 unbreakable ciphers Secret
Key Cryptography gives you a toolbox of cryptographic techniques
and Secret Key methods. The book's simple, non-technical language
is easy to understand and accessible for any reader, even without
the advanced mathematics normally required for cryptography. You'll
learn how to create and solve ciphers, as well as how to measure
their strength. As you go, you'll explore both historic ciphers and
groundbreaking new approaches-including a never-before-seen way to
implement the uncrackable One-Time Pad algorithm. about the
technology Secret Key cryptography is the backbone of all modern
computing infrastructure. Secret Key ciphers use the same key to
encrypt and decrypt messages. Properly designed, these algorithms
are efficient and practical. Some Secret Key approaches are
uncrackable, even under attacks backed by supercomputers or quantum
technology! about the book Secret Key Cryptography teaches anyone
how to create a wide range of ciphers-even if you have no
background in math or creating codes. You'll combine Secret Key
techniques to achieve ciphers that are effectively uncrackable and
avoid common pitfalls that result in strong-looking but weak
ciphers. The book reveals scores of different cipher methods,
including both historic examples and current innovations in the
field. RETAIL SELLING POINTS * Measure the strength of your ciphers
and learn how to guarantee their security * Construct and
incorporate data-compression codes * Generate true random numbers
in bulk * Construct huge primes and safe primes * Add an
undetectable backdoor to a cipher * Defeat hypothetical ultra
computers that could be developed decades from now * Construct 30
unbreakable ciphers AUDIENCE For professional engineers, computer
scientists, and cryptography hobbyists. No advanced math knowledge
is required
 |
Ransomware
(Paperback)
Allan Liska, Timothy Gallo
|
R867
R746
Discovery Miles 7 460
Save R121 (14%)
|
Ships in 18 - 22 working days
|
|
|
The biggest online threat to businesses and consumers today is
ransomware, a category of malware that can encrypt your computer
files until you pay a ransom to unlock them. With this practical
book, you'll learn how easily ransomware infects your system and
what steps you can take to stop the attack before it sets foot in
the network. Security experts Allan Liska and Timothy Gallo explain
how the success of these attacks not only has spawned several
variants of ransomware, but also a litany of ever-changing ways
they're delivered to targets. You'll learn pragmatic methods for
responding quickly to a ransomware attack, as well as how to
protect yourself from becoming infected in the first place. Learn
how ransomware enters your system and encrypts your files
Understand why ransomware use has grown, especially in recent years
Examine the organizations behind ransomware and the victims they
target Learn how wannabe hackers use Ransomware as a Service (RaaS)
to launch campaigns Understand how ransom is paid-and the pros and
cons of paying Use methods to protect your organization's
workstations and servers
"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.
Written by leading macOS threat analyst Patrick Wardle, The Art of
Mac Malware Analysis covers the knowledge and hands-on skills
required to analyze Mac malware. Using real-world examples and
references to original research, Part 1 surveys the malware's
various infection methods, persistence mechanisms, and
capabilities. In Part 2, you'll learn about the static and dynamic
analysis tools and techniques needed to examine malware you may
find in the wild. Finally, you'll put these lessons into practice
by walking through a comprehensive analysis of a complex Mac
malware specimen (Part 3).
This book provides a brief and general introduction to
cybersecurity and cyber-risk assessment. Not limited to a specific
approach or technique, its focus is highly pragmatic and is based
on established international standards (including ISO 31000) as
well as industrial best practices. It explains how cyber-risk
assessment should be conducted, which techniques should be used
when, what the typical challenges and problems are, and how they
should be addressed. The content is divided into three parts.
First, part I provides a conceptual introduction to the topic of
risk management in general and to cybersecurity and cyber-risk
management in particular. Next, part II presents the main stages of
cyber-risk assessment from context establishment to risk treatment
and acceptance, each illustrated by a running example. Finally,
part III details four important challenges and how to reasonably
deal with them in practice: risk measurement, risk scales,
uncertainty, and low-frequency risks with high consequence. The
target audience is mainly practitioners and students who are
interested in the fundamentals and basic principles and techniques
of security risk assessment, as well as lecturers seeking teaching
material. The book provides an overview of the cyber-risk
assessment process, the tasks involved, and how to complete them in
practice.
A practical guide to enhancing your digital investigations with
cutting-edge memory forensics techniques Key Features Explore
memory forensics, one of the vital branches of digital
investigation Learn the art of user activities reconstruction and
malware detection using volatile memory Get acquainted with a range
of open-source tools and techniques for memory forensics Book
DescriptionMemory Forensics is a powerful analysis technique that
can be used in different areas, from incident response to malware
analysis. With memory forensics, you can not only gain key insights
into the user's context but also look for unique traces of malware,
in some cases, to piece together the puzzle of a sophisticated
targeted attack. Starting with an introduction to memory forensics,
this book will gradually take you through more modern concepts of
hunting and investigating advanced malware using free tools and
memory analysis frameworks. This book takes a practical approach
and uses memory images from real incidents to help you gain a
better understanding of the subject and develop the skills required
to investigate and respond to malware-related incidents and complex
targeted attacks. You'll cover Windows, Linux, and macOS internals
and explore techniques and tools to detect, investigate, and hunt
threats using memory forensics. Equipped with this knowledge,
you'll be able to create and analyze memory dumps on your own,
examine user activity, detect traces of fileless and memory-based
malware, and reconstruct the actions taken by threat actors. By the
end of this book, you'll be well-versed in memory forensics and
have gained hands-on experience of using various tools associated
with it. What you will learn Understand the fundamental concepts of
memory organization Discover how to perform a forensic
investigation of random access memory Create full memory dumps as
well as dumps of individual processes in Windows, Linux, and macOS
Analyze hibernation files, swap files, and crash dumps Apply
various methods to analyze user activities Use multiple approaches
to search for traces of malicious activity Reconstruct threat actor
tactics and techniques using random access memory analysis Who this
book is forThis book is for incident responders, digital forensic
specialists, cybersecurity analysts, system administrators, malware
analysts, students, and curious security professionals new to this
field and interested in learning memory forensics. A basic
understanding of malware and its working is expected. Although not
mandatory, knowledge of operating systems internals will be
helpful. For those new to this field, the book covers all the
necessary concepts.
Gain a firm, practical understanding of securing your network and
utilize Python's packages to detect vulnerabilities in your
application Key Features * Discover security techniques to protect
your network and systems using Python 3.10 * Create scripts in
Python to automate security and pentesting tasks * Analyze network
traffic in a network and extract information using Python 3.10 Book
Description Python's latest updates add numerous libraries that can
be used to perform critical security-related missions, including
detecting vulnerabilities in web applications, taking care of
attacks, and helping to build secure and robust networks that are
resilient to them. This fully updated third edition will show you
how to make the most of them and improve your security posture. The
first part of this book will walk you through Python scripts and
libraries that you'll use throughout the book. Next, you'll dive
deep into the core networking tasks where you will learn how to
check a network's vulnerability using Python security scripting and
understand how to check for vulnerabilities in your network -
including tasks related to packet sniffing. You'll also learn how
to achieve endpoint protection by leveraging Python packages along
with writing forensics scripts. The next part of the book will show
you a variety of modern techniques, libraries, and frameworks from
the Python ecosystem that will help you extract data from servers
and analyze the security in web applications. You'll take your
first steps in extracting data from a domain using OSINT tools and
using Python tools to perform forensics tasks. By the end of this
book, you will be able to make the most of Python to test the
security of your network and applications. What you will learn *
Create scripts in Python to automate security and pentesting tasks
* Program your own tools in Python that can be used in a Network
Security process * Automate tasks of analysis and extraction of
information from servers * Detect Server Vulnerabilities and
analyze security in web applications * Utilize the ssh-audit tool
to check the security in SSH servers * Explore WriteHat as a
pentesting reports tool written in Python * Automate the process of
detecting vulnerabilities in applications with tools like
Fuxploider Who This Book Is For This Python book is for network
engineers, system administrators, and other security professionals
looking to overcome common networking and security issues using
Python. You will also find this book useful if you're an
experienced programmer looking to explore Python's full range of
capabilities. A basic understanding of general programming
structures as well as familiarity with the Python programming
language is a prerequisite.
Thwart hackers by preventing, detecting, and misdirecting access
before they can plant malware, obtain credentials, engage in fraud,
modify data, poison models, corrupt users, eavesdrop, and otherwise
ruin your day Key Features Discover how hackers rely on
misdirection and deep fakes to fool even the best security systems
Retain the usefulness of your data by detecting unwanted and
invalid modifications Develop application code to meet the security
requirements related to machine learning Book DescriptionBusinesses
are leveraging the power of AI to make undertakings that used to be
complicated and pricy much easier, faster, and cheaper. The first
part of this book will explore these processes in more depth, which
will help you in understanding the role security plays in machine
learning. As you progress to the second part, you'll learn more
about the environments where ML is commonly used and dive into the
security threats that plague them using code, graphics, and
real-world references. The next part of the book will guide you
through the process of detecting hacker behaviors in the modern
computing environment, where fraud takes many forms in ML, from
gaining sales through fake reviews to destroying an adversary's
reputation. Once you've understood hacker goals and detection
techniques, you'll learn about the ramifications of deep fakes,
followed by mitigation strategies. This book also takes you through
best practices for embracing ethical data sourcing, which reduces
the security risk associated with data. You'll see how the simple
act of removing personally identifiable information (PII) from a
dataset lowers the risk of social engineering attacks. By the end
of this machine learning book, you'll have an increased awareness
of the various attacks and the techniques to secure your ML systems
effectively. What you will learn Explore methods to detect and
prevent illegal access to your system Implement detection
techniques when access does occur Employ machine learning
techniques to determine motivations Mitigate hacker access once
security is breached Perform statistical measurement and behavior
analysis Repair damage to your data and applications Use ethical
data collection methods to reduce security risks Who this book is
forWhether you're a data scientist, researcher, or manager working
with machine learning techniques in any aspect, this security book
is a must-have. While most resources available on this topic are
written in a language more suitable for experts, this guide
presents security in an easy-to-understand way, employing a host of
diagrams to explain concepts to visual learners. While familiarity
with machine learning concepts is assumed, knowledge of Python and
programming in general will be useful.
Protecting your end-users and IT infrastructure against the common
ransomware attack vectors and efficiently monitoring future
threats. Key Features * Learn to build security monitoring
solutions based on Microsoft 365 and Sentinel * Understand how
Zero-Trust access and SASE services can help in reducing and
mitigating risks * Build a secure foundation for Windows Endpoints,
email, infrastructure, and cloud services Book Description Looking
for an effective way to secure your environment from ransomware
attacks? Grab this book to learn how to monitor security threats,
security monitoring, and how to establish countermeasures to
protect against ransomware attacks. This book starts with
understanding how ransomware attacks work, identifying different
attack vectors, and how to build a secure network foundation and
Windows environment. Then this book will guide you through
ransomware countermeasures in different segments such as Identity
Management Access, Networking, Endpoint Manager, Cloud, and
Infrastructure by which you will learn how to protect against
attacks. As you move forward, you will get your hands into
forensics about important considerations if you got attacked or
compromised with ransomware, what you should do, and how you can
monitor the threat landscape for future threats by exploring
different online data sources and building processes. By the end of
this book, you will learn how configuration settings and scripts
can be used to protect Windows from ransomware attacks with 50 tips
on security settings to secure your Windows workload. What you will
learn * Understand how ransomware has evolved into the larger
threat * Secure identity-based access using services like MFA *
Enrich data with threat intelligence and other external data
sources * Protect devices with Microsoft Defender and Network
Protection * Learn how to secure users in Active Directory and
Azure Active Directory * Secure your Windows Endpoints using
Endpoint Manager * Design network architecture in Azure to reduce
the risk of lateral movement Who This Book Is For This book is for
Windows administrators, Cloud administrators, CISOs, and Blue Team
members, who want to understand the ransomware problem, how
attackers execute the intrusions, and how one can use the
techniques to counteract the attacks. This book is also for
Security administrators who want more insight into how they can
secure their environment. Basic experience is needed across Windows
and Cloud.
|
|