|
Since the publication of Malware Forensics: Investigating and
Analyzing Malicious Code in 2008, the number and
complexity of programs developed for malicious and illegal
purposes has grown substantially. The 2011 Symantec Internet
Security Threat Report announced that over 286 million new
threats emerged in the past year. Other anti-virus vendors,
including F-Secure, forecast an increase in attacks against mobile
devices and SCADA systems in 2011.
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
*A condensed hand-held guide complete with on-the-job tasks and checklists
*Specific for Windows-based systems, the largest running OS in the world
*Authors are world-renowned leaders in investigating and analyzing malicious code |
|
|
50 Android Hacks
Summary
The best programming techniques are often the shortest and simplest—the hacks. In this compact and infinitely useful book, Android expert Carlos Sessa delivers 50 hacks that will save you time, stretch your skills, and maybe even make you smile.
About this Book
Hacks.... | | Digital People: From Bionic Humans to AndroidsRobots, androids, and bionic people pervade popular culture, from classics like Frankenstein and R.U.R. to modern tales such as The Six Million Dollar Man, The Terminator, and A.I. Our fascination is obvious – and the technology is quickly moving from books and films to real life.
In a lab at MIT, scientists and technicians have created... | | |
|