Practical Malware Analysis pdf epub mobi txt 电子书 下载 2024


Practical Malware Analysis

简体网页||繁体网页
Michael Sikorski
No Starch Press
2012-2
760
$ 67.74
9781593272906

图书标签: 计算机安全  安全  逆向  计算机  病毒  windows内核的  malware  信息安全   


喜欢 Practical Malware Analysis 的读者还喜欢




点击这里下载
    


想要找书就要到 小哈图书下载中心
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

发表于2024-11-24

Practical Malware Analysis epub 下载 mobi 下载 pdf 下载 txt 电子书 下载 2024

Practical Malware Analysis epub 下载 mobi 下载 pdf 下载 txt 电子书 下载 2024

Practical Malware Analysis pdf epub mobi txt 电子书 下载 2024



图书描述

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: * Set up a safe virtual environment to analyze malware * Quickly extract network signatures and host-based indicators * Use key analysis tools like IDA Pro, OllyDbg, and WinDbg * Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques * Use your newfound knowledge of Windows internals for malware analysis * Develop a methodology for unpacking malware and get practical experience with five of the most popular packers * Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back. Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Practical Malware Analysis 下载 mobi epub pdf txt 电子书

著者简介

Michael Sikorski is a malware analyst, researcher, and security consultant at Mandiant. His previous employers include the National Security Agency and MIT Lincoln Laboratory. Mike frequently teaches malware analysis to a variety of audiences including the FBI and Black Hat.

Andrew Honig is an Information Assurance Expert for the Department of Defense. He teaches courses on software analysis, reverse engineering, and Windows system programming. Andy is publicly credited with several zero-day exploits in VMware's virtualization products.


图书目录


Practical Malware Analysis pdf epub mobi txt 电子书 下载
想要找书就要到 小哈图书下载中心
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

用户评价

评分

了解病毒分析的一本好书

评分

了解病毒分析的一本好书

评分

了解病毒分析的一本好书

评分

帮助入门吧

评分

了解病毒分析的一本好书

读后感

评分

随便在哪家网上书城进行搜索可以知道,在计算机安全类,特别是恶意代码分析领域的书籍可谓是凤毛麟角。如果哪位读者对于恶意代码分析有浓厚的兴趣,要么是去一些大型的安全类论坛看他人的分析报告,要么是在众多的安全类书籍中,东找一点西凑一点地进行学习。这也就说明了市面...  

评分

第15章习题 Lab15.3中通过SEH来执行恶意代码,其还原存在一个问题 mov eax,large fs:0 // 获取Esp mov eax,[eax] // 获取ExceptionList mov eax,[eax] // 获取Next mov large fs:0 eax; // 还原fs:0 如下代码,其不仅将恶意代码从链表中摘除,也会摘除正常的第一个_EXCEPTION_R...

评分

第15章习题 Lab15.3中通过SEH来执行恶意代码,其还原存在一个问题 mov eax,large fs:0 // 获取Esp mov eax,[eax] // 获取ExceptionList mov eax,[eax] // 获取Next mov large fs:0 eax; // 还原fs:0 如下代码,其不仅将恶意代码从链表中摘除,也会摘除正常的第一个_EXCEPTION_R...

评分

第15章习题 Lab15.3中通过SEH来执行恶意代码,其还原存在一个问题 mov eax,large fs:0 // 获取Esp mov eax,[eax] // 获取ExceptionList mov eax,[eax] // 获取Next mov large fs:0 eax; // 还原fs:0 如下代码,其不仅将恶意代码从链表中摘除,也会摘除正常的第一个_EXCEPTION_R...

评分

类似图书 点击查看全场最低价

Practical Malware Analysis pdf epub mobi txt 电子书 下载 2024


分享链接









相关图书




本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

友情链接

© 2024 qciss.net All Rights Reserved. 小哈图书下载中心 版权所有