Books > Computing & IT > Social & legal aspects of computing > Computer viruses
|
Buy Now
Malware Analysis Techniques - Tricks for the triage of adversarial software (Paperback)
Loot Price: R1,386
Discovery Miles 13 860
|
|
Malware Analysis Techniques - Tricks for the triage of adversarial software (Paperback)
Expected to ship within 10 - 15 working days
|
Analyze malicious samples, write reports, and use industry-standard
methodologies to confidently triage and analyze adversarial
software and malware Key Features Investigate, detect, and respond
to various types of malware threat Understand how to use what
you've learned as an analyst to produce actionable IOCs and
reporting Explore complete solutions, detailed walkthroughs, and
case studies of real-world malware samples Book
DescriptionMalicious software poses a threat to every enterprise
globally. Its growth is costing businesses millions of dollars due
to currency theft as a result of ransomware and lost productivity.
With this book, you'll learn how to quickly triage, identify,
attribute, and remediate threats using proven analysis techniques.
Malware Analysis Techniques begins with an overview of the nature
of malware, the current threat landscape, and its impact on
businesses. Once you've covered the basics of malware, you'll move
on to discover more about the technical nature of malicious
software, including static characteristics and dynamic attack
methods within the MITRE ATT&CK framework. You'll also find out
how to perform practical malware analysis by applying all that
you've learned to attribute the malware to a specific threat and
weaponize the adversary's indicators of compromise (IOCs) and
methodology against them to prevent them from attacking. Finally,
you'll get to grips with common tooling utilized by professional
malware analysts and understand the basics of reverse engineering
with the NSA's Ghidra platform. By the end of this malware analysis
book, you'll be able to perform in-depth static and dynamic
analysis and automate key tasks for improved defense against
attacks. What you will learn Discover how to maintain a safe
analysis environment for malware samples Get to grips with static
and dynamic analysis techniques for collecting IOCs
Reverse-engineer and debug malware to understand its purpose
Develop a well-polished workflow for malware analysis Understand
when and where to implement automation to react quickly to threats
Perform malware analysis tasks such as code analysis and API
inspection Who this book is forThis book is for incident response
professionals, malware analysts, and researchers who want to
sharpen their skillset or are looking for a reference for common
static and dynamic analysis techniques. Beginners will also find
this book useful to get started with learning about malware
analysis. Basic knowledge of command-line interfaces, familiarity
with Windows and Unix-like filesystems and registries, and
experience in scripting languages such as PowerShell, Python, or
Ruby will assist with understanding the concepts covered.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.