|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn830164262 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130316s2012 cau o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDXCP
|d MEAUC
|d DEBSZ
|d OCLCQ
|d XFH
|d OCLCF
|d IDEBK
|d RECBK
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCO
|d U3W
|d OCLCA
|d CNNOR
|d ICG
|d INT
|d AU@
|d OCLCQ
|d DKC
|d OCLCQ
|d SGP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 994353322
|a 1156147137
|
020 |
|
|
|a 9781593274306
|
020 |
|
|
|a 1593274300
|
020 |
|
|
|a 1593272901
|
020 |
|
|
|a 9781593272906
|
029 |
1 |
|
|a DEBBG
|b BV044173859
|
029 |
1 |
|
|a DEBSZ
|b 397494270
|
035 |
|
|
|a (OCoLC)830164262
|z (OCoLC)994353322
|z (OCoLC)1156147137
|
050 |
|
4 |
|a QA76.76.C68 S534 2012
|
080 |
|
|
|a 004.491.22
|
082 |
0 |
4 |
|a 005.84
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sikorski, Michael.
|
245 |
1 |
0 |
|a Practical Malware Analysis :
|b a Hands-On Guide to Dissecting Malicious Software.
|
260 |
|
|
|a San Francisco :
|b No Starch Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (802 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Warning; About the Authors; About the Technical Reviewer; About the Contributing Authors; Foreword; Acknowledgments; Individual Thanks; Introduction; What Is Malware Analysis?; Prerequisites; Practical, Hands-On Learning; What's in the Book?; 0: Malware Analysis Primer; The Goals of Malware Analysis; Malware Analysis Techniques; Basic Static Analysis; Basic Dynamic Analysis; Advanced Static Analysis; Advanced Dynamic Analysis; Types of Malware; General Rules for Malware Analysis; Part 1: Basic Analysis; 1: Basic Static Techniques; Antivirus Scanning: A Useful First Step.
|
505 |
8 |
|
|a Hashing: A Fingerprint for MalwareFinding Strings; Packed and Obfuscated Malware; Packing Files; Detecting Packers with PEiD; Portable Executable File Format; Linked Libraries and Functions; Static, Runtime, and Dynamic Linking; Exploring Dynamically Linked Functions with Dependency Walker; Imported Functions; Exported Functions; Static Analysis in Practice; PotentialKeylogger.exe: An Unpacked Executable; PackedProgram.exe: A Dead End; The PE File Headers and Sections; Examining PE Files with PEview; Viewing the Resource Section with Resource Hacker; Using Other PE File Tools.
|
505 |
8 |
|
|a PE Header SummaryConclusion; Lab 1-1; Questions; Lab 1-2; Questions; Lab 1-3; Questions; Lab 1-4; Questions; 2: Malware Analysis in Virtual Machines; The Structure of a Virtual Machine; Creating Your Malware Analysis Machine; Configuring VMware; Using Your Malware Analysis Machine; Connecting Malware to the Internet; Connecting and Disconnecting Peripheral Devices; Taking Snapshots; Transferring Files from a Virtual Machine; The Risks of Using VMware for Malware Analysis; Record/Replay: Running Your Computer in Reverse; Conclusion; 3: Basic Dynamic Analysis.
|
505 |
8 |
|
|a Sandboxes: The Quick-and-Dirty ApproachUsing a Malware Sandbox; Sandbox Drawbacks; Running Malware; Monitoring with Process Monitor; The Procmon Display; Filtering in Procmon; Viewing Processes with Process Explorer; The Process Explorer Display; Using the Verify Option; Comparing Strings; Using Dependency Walker; Analyzing Malicious Documents; Comparing Registry Snapshots with Regshot; Faking a Network; Using ApateDNS; Monitoring with Netcat; Packet Sniffing with Wireshark; Using INetSim; Basic Dynamic Tools in Practice; Conclusion; Lab 3-1; Questions; Lab 3-2; Questions; Lab 3-3; Questions.
|
505 |
8 |
|
|a Lab 3-4Questions; Part 2: Advanced Static Analysis; 4: A Crash Course in x86 Disassembly; Levels of Abstraction; Reverse-Engineering; The x86 Architecture; Main Memory; Instructions; Opcodes and Endianness; Operands; Registers; Simple Instructions; The Stack; Conditionals; Branching; Rep Instructions; C Main Method and Offsets; More Information: Intel x86 Architecture Manuals; Conclusion; 5: IDA Pro; Loading an Executable; The IDA Pro Interface; Disassembly Window Modes; Useful Windows for Analysis; Returning to the Default View; Navigating IDA Pro; Searching; Using Cross-References.
|
500 |
|
|
|a Code Cross-References.
|
520 |
|
|
|a There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Debugging in computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
6 |
|a Virus informatiques.
|
650 |
|
6 |
|a Débogage.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Viruses & Malware.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer viruses
|2 fast
|
650 |
|
7 |
|a Debugging in computer science
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
700 |
1 |
|
|a Honig, Andrew.
|
758 |
|
|
|i has work:
|a Practical malware analysis (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGfFqxBVbRTkRX7hHgM8fq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Sikorski, Michael.
|t Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.
|d San Francisco : No Starch Press, ©2012
|z 9781593272906
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1137570
|z Texto completo
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis23519482
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00709953
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10349927
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6095762
|
994 |
|
|
|a 92
|b IZTAP
|