Cargando…

Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code /

"A computer forensics "how-to" for fighting malicious code and analyzing incidents -- With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Ligh, Michael Hale
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn742020821
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 110722s2011 inua o 001 0 eng d
010 |z  2010933462 
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d E7B  |d STF  |d B24X7  |d REDDC  |d OCLCQ  |d HEBIS  |d DEBSZ  |d OCLCQ  |d YDXCP  |d COD  |d CDX  |d BTCTA  |d S4S  |d OCLCF  |d OCLCQ  |d EBLCP  |d AU@  |d IDEBK  |d OCLCQ  |d YDX  |d COCUF  |d CNNOR  |d Z5A  |d OCLCQ  |d OCLCA  |d CEF  |d INT  |d OCLCQ  |d VLY  |d BRF  |d EYM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 526098220  |a 694649397  |a 696930430  |a 732600494  |a 744319824  |a 765143977  |a 889158805  |a 957524056  |a 957617516  |a 1058072760  |a 1059043808  |a 1060198548  |a 1096238433  |a 1162092074  |a 1179556694  |a 1194768493 
020 |a 9781118003367  |q (ebk) 
020 |a 1118003365  |q (ebk) 
020 |a 9781118008294  |q (ebk) 
020 |a 1118008294  |q (ebk) 
020 |a 9781118008300  |q (ebk) 
020 |a 1118008308  |q (ebk) 
020 |z 9780470613030  |q (pbk.) 
020 |z 0470613033  |q (pbk.) 
020 |a 1282849409 
020 |a 9781282849402 
020 |a 9786612849404 
020 |a 6612849401 
024 8 |a 9786612849404 
029 1 |a AU@  |b 000050967437 
029 1 |a AU@  |b 000053023673 
029 1 |a AU@  |b 000053266421 
029 1 |a CHNEW  |b 000608095 
029 1 |a DEBSZ  |b 368469492 
029 1 |a DEBSZ  |b 372695795 
029 1 |a HEBIS  |b 29153662X 
029 1 |a NZ1  |b 14256539 
029 1 |a NZ1  |b 15412182 
035 |a (OCoLC)742020821  |z (OCoLC)526098220  |z (OCoLC)694649397  |z (OCoLC)696930430  |z (OCoLC)732600494  |z (OCoLC)744319824  |z (OCoLC)765143977  |z (OCoLC)889158805  |z (OCoLC)957524056  |z (OCoLC)957617516  |z (OCoLC)1058072760  |z (OCoLC)1059043808  |z (OCoLC)1060198548  |z (OCoLC)1096238433  |z (OCoLC)1162092074  |z (OCoLC)1179556694  |z (OCoLC)1194768493 
037 |a CL0500000102  |b Safari Books Online 
050 4 |a QA76.9.A25  |b M35 2011 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Malware analyst's cookbook and DVD :  |b tools and techniques for fighting malicious code /  |c Michael Hale Ligh [and others]. 
246 3 0 |a Tools and techniques for fighting malicious code 
260 |a Indianapolis, IN :  |b Wiley,  |c ©2011. 
300 |a 1 online resource (xxvi, 716 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry. 
520 |a "A computer forensics "how-to" for fighting malicious code and analyzing incidents -- With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions -- Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more -- Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions -- Malware Analyst's Cookbook is indispensable to IT security administrators, incident responders, forensic analysts, and malware researchers."--Provided by publisher. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
650 6 |a Logiciels malveillants. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Ligh, Michael Hale. 
776 0 8 |i Print version:  |t Malware analyst's cookbook and DVD.  |d Indianapolis, IN : Wiley, ©2011  |z 9780470613030  |w (OCoLC)651073639 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780470613030/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00040742 
938 |a Baker and Taylor  |b BTCP  |n BK0008804634 
938 |a Coutts Information Services  |b COUT  |n 15923294  |c 39.99 GBP 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4030314 
938 |a ebrary  |b EBRY  |n ebr10469873 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 284940 
938 |a YBP Library Services  |b YANK  |n 3603384 
938 |a YBP Library Services  |b YANK  |n 12668976 
938 |a YBP Library Services  |b YANK  |n 3374378 
994 |a 92  |b IZTAP