![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing a flexible approach that can adapt and evolve to new and emerging threats. Follow the expert advice in this guide and you'll reliably deliver software that is free from security defects and critical vulnerabilities. As a developer, you must build security into your software throughout its development lifecycle. This book addresses all the practices, tools, technology, people, and processes you need to reduce the risk of attacks and vulnerabilities in your software. Application Security Program Handbook is full of strategies for setting up and maturing a security program for your development process. Its realistic recommendations take a service-oriented approach to application security that's perfectly suited to the fast-pace of modern development. Focused on the realities of software development, it shows you how to avoid making security a gated exercise. Inside, you'll learn to assess the current state of your app's security, identify key risks to your organization, and measure the success of any defensive programs you deploy. You'll master common methodologies and practices that help safeguard your software, along with defensive tools you can use to keep your apps safe. With this handy reference guide by your side, you'll be able to implement reliable security in a way that doesn't impact your delivery speed. RETAIL SELLING POINTS Application security tools you can use throughout the development lifecycle Creating threat models Mitigating web app vulnerabilities Creating a DevSecOps pipeline Application security as a service model Reporting structures that highlight the value of application security Creating a software security ecosystem that benefits development AUDIENCE For software developers, architects, team leaders, and project managers looking to implement security in their pipelines.
This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.
The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative
While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorised access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorising users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses. The objective of this book is to evaluate the extent to which FAA has effectively implemented information security controls to protect its air traffic control systems. This book also identifies the cybersecurity challenges facing FAA as it shifts to the NextGen ATC system and how FAA has begun addressing those challenges; and assesses the extent to which FAA and its contractors, in the acquisition of NextGen programs, have followed federal guidelines for incorporating cybersecurity controls.
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutionsCovers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much moreIncludes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions "Malware Analyst's Cookbook" is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover: A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques The unique tells and signs of an attack and how to avoid becoming a victim of one What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.
Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. "Computer Viruses For Dummies" helps you: Understand the risks and analyze your PC's current conditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it's already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and when you're surfing the Net Written by Peter H. Gregory, coauthor of "CISSP For Dummies" and "Security + For Dummies," "Computer Viruses For Dummies" goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs. Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers
Mr. Robot has been hailed, not only as one of the most haunting and unnerving dramas ever to appear on television, but also as the first accurate popular presentation of how computer hacking and cyberterrorism actually work. Mr. Robot and Philosophy is aimed at thoughtful fans of this addictive show who will welcome the opportunity to explore Elliot Alderson's world from a philosophical perspective. The developing story of Mr. Robot constantly raises ethical and metaphysical issues. What happens to our personal identity when it's extended into cyberspace and an array of electronic devices? Are we in control of our online lives or are we being controlled? What does our right to privacy mean in a world where millions of people can observe what we're doing and saying? Is a virtual currency true money and could it replace traditional money? Can there be healthy forms of drug addiction? Can some types of so-called mental illness be useful and beneficial? Does it make any sense to unleash destruction upon the existing corporate economic structures, and can we expect something better to emerge from the ruins of a digital meltdown?
"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.
Protecting your end-users and IT infrastructure against the common ransomware attack vectors and efficiently monitoring future threats. Key Features * Learn to build security monitoring solutions based on Microsoft 365 and Sentinel * Understand how Zero-Trust access and SASE services can help in reducing and mitigating risks * Build a secure foundation for Windows Endpoints, email, infrastructure, and cloud services Book Description Looking for an effective way to secure your environment from ransomware attacks? Grab this book to learn how to monitor security threats, security monitoring, and how to establish countermeasures to protect against ransomware attacks. This book starts with understanding how ransomware attacks work, identifying different attack vectors, and how to build a secure network foundation and Windows environment. Then this book will guide you through ransomware countermeasures in different segments such as Identity Management Access, Networking, Endpoint Manager, Cloud, and Infrastructure by which you will learn how to protect against attacks. As you move forward, you will get your hands into forensics about important considerations if you got attacked or compromised with ransomware, what you should do, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes. By the end of this book, you will learn how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload. What you will learn * Understand how ransomware has evolved into the larger threat * Secure identity-based access using services like MFA * Enrich data with threat intelligence and other external data sources * Protect devices with Microsoft Defender and Network Protection * Learn how to secure users in Active Directory and Azure Active Directory * Secure your Windows Endpoints using Endpoint Manager * Design network architecture in Azure to reduce the risk of lateral movement Who This Book Is For This book is for Windows administrators, Cloud administrators, CISOs, and Blue Team members, who want to understand the ransomware problem, how attackers execute the intrusions, and how one can use the techniques to counteract the attacks. This book is also for Security administrators who want more insight into how they can secure their environment. Basic experience is needed across Windows and Cloud.
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features Apply real-world strategies to strengthen the capabilities of your organization's security system Learn to not only defend your system but also think from an attacker's perspective Ensure the ultimate effectiveness of an organization's red and blue teams with practical tips Book DescriptionWith small to large companies focusing on hardening their security systems, the term "purple team" has gained a lot of traction over the last couple of years. Purple teams represent a group of individuals responsible for securing an organization's environment using both red team and blue team testing and integration - if you're ready to join or advance their ranks, then this book is for you. Purple Team Strategies will get you up and running with the exact strategies and techniques used by purple teamers to implement and then maintain a robust environment. You'll start with planning and prioritizing adversary emulation, and explore concepts around building a purple team infrastructure as well as simulating and defending against the most trendy ATT&CK tactics. You'll also dive into performing assessments and continuous testing with breach and attack simulations. Once you've covered the fundamentals, you'll also learn tips and tricks to improve the overall maturity of your purple teaming capabilities along with measuring success with KPIs and reporting. With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures. What you will learn Learn and implement the generic purple teaming process Use cloud environments for assessment and automation Integrate cyber threat intelligence as a process Configure traps inside the network to detect attackers Improve red and blue team collaboration with existing and new tools Perform assessments of your existing security controls Who this book is forIf you're a cybersecurity analyst, SOC engineer, security leader or strategist, or simply interested in learning about cyber attack and defense strategies, then this book is for you. Purple team members and chief information security officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. You'll need some basic knowledge of Windows and Linux operating systems along with a fair understanding of networking concepts before you can jump in, while ethical hacking and penetration testing know-how will help you get the most out of this book.
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning. As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references. The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively. What you will learn Explore methods to detect and prevent illegal access to your system Implement detection techniques when access does occur Employ machine learning techniques to determine motivations Mitigate hacker access once security is breached Perform statistical measurement and behavior analysis Repair damage to your data and applications Use ethical data collection methods to reduce security risks Who this book is forWhether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features Explore memory forensics, one of the vital branches of digital investigation Learn the art of user activities reconstruction and malware detection using volatile memory Get acquainted with a range of open-source tools and techniques for memory forensics Book DescriptionMemory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack. Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors. By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it. What you will learn Understand the fundamental concepts of memory organization Discover how to perform a forensic investigation of random access memory Create full memory dumps as well as dumps of individual processes in Windows, Linux, and macOS Analyze hibernation files, swap files, and crash dumps Apply various methods to analyze user activities Use multiple approaches to search for traces of malicious activity Reconstruct threat actor tactics and techniques using random access memory analysis Who this book is forThis book is for incident responders, digital forensic specialists, cybersecurity analysts, system administrators, malware analysts, students, and curious security professionals new to this field and interested in learning memory forensics. A basic understanding of malware and its working is expected. Although not mandatory, knowledge of operating systems internals will be helpful. For those new to this field, the book covers all the necessary concepts.
Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application Key Features * Discover security techniques to protect your network and systems using Python 3.10 * Create scripts in Python to automate security and pentesting tasks * Analyze network traffic in a network and extract information using Python 3.10 Book Description Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture. The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts. The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks. By the end of this book, you will be able to make the most of Python to test the security of your network and applications. What you will learn * Create scripts in Python to automate security and pentesting tasks * Program your own tools in Python that can be used in a Network Security process * Automate tasks of analysis and extraction of information from servers * Detect Server Vulnerabilities and analyze security in web applications * Utilize the ssh-audit tool to check the security in SSH servers * Explore WriteHat as a pentesting reports tool written in Python * Automate the process of detecting vulnerabilities in applications with tools like Fuxploider Who This Book Is For This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite. |
![]() ![]() You may like...
The Little Book Of Safari Animal Sounds
Caz Buckingham, Andrea Pinnington
Board book
![]()
|