Cargando…

Advanced malware analysis /

"In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Njenga, Munir (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1062397127
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 181112s2018 xx 244 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d TOH  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000066234792 
035 |a (OCoLC)1062397127 
037 |a CL0501000006  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Njenga, Munir,  |e speaker. 
245 1 0 |a Advanced malware analysis /  |c Munir Njenga. 
264 1 |a [Place of publication not identified] :  |b Packt,  |c 2018. 
300 |a 1 online resource (1 streaming video file (4 hr., 3 min., 31 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen (Safari, viewed November 9, 2018). 
500 |a Release date from resource description page (Safari, viewed November 9, 2018). 
511 0 |a Presenter, Munir Njenga. 
520 |a "In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system. Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks. Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
650 6 |a Logiciels malveillants. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781788627146/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP