Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Buy

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • Develop innovative solutions to numerous malware incidents

Book Description

With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you'll be able to mitigate the risk of encountering malicious code and malware.

Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You'll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you'll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you'll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you'll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.

By the end of this book, you'll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.

What you will learn

  • Explore widely used assembly languages to enhance your reverse-engineering skills
  • Master different executable file formats, programming languages, and relevant APIs used by attackers
  • Perform static and dynamic analysis for multiple platforms and file types
  • Get to grips with handling sophisticated malware cases
  • Understand all stages of real advanced attacks, from infiltration to hacking the system
  • Discover how you can bypass anti-reverse engineering techniques

Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents

  1. A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
  2. Basic Static and Dynamic Analysis for x86/x64
  3. Unpacking, Decryption and Deobfuscation
  4. Inspecting Process Injection & API Hooking
  5. Bypassing Anti-Reverse Engineering Techniques
  6. Understanding Kernel-Mode & Rootkits
  7. Handling Exploits & Shellcode
  8. Reversing Bytecode Languages: DotNet, Java and More
  9. Scripts & Macros: Reversing, Deobfuscation and Debugging
  10. Dissecting Linux and IoT Malware
  11. Intro to MacOS and iOS Threats
  12. Analyzing Android Malware Samples
(HTML tags aren't allowed.)

Statistics Essentials For Dummies
Statistics Essentials For Dummies

Statistics Essentials For Dummies not only provides students enrolled in Statistics I with an excellent high-level overview of key concepts, but it also serves as a reference or refresher for students in upper-level statistics courses. Free of review and ramp-up material, Statistics Essentials For Dummies sticks to the point,...

Financial Planning Using Excel, Second Edition: Forecasting, Planning and Budgeting Techniques (CIMA Exam Support Books)
Financial Planning Using Excel, Second Edition: Forecasting, Planning and Budgeting Techniques (CIMA Exam Support Books)
The objective of this book is to help financial planners improve their spreadsheet skills by providing a structured approach to developing spreadsheets for forecasting, financial planning and budgeting applications.

The book assumes that the reader is familiar with the basic operation of Excel and is not intended for beginners.
...
Pro WF: Windows Workflow in .NET 3.0 (Expert's Voice in .Net)
Pro WF: Windows Workflow in .NET 3.0 (Expert's Voice in .Net)
Windows Workflow Foundation is a ground-breaking addition to the core of the .NET Framework that allows you to orchestrate human and system interactions as a series of workflows that can be easily mapped, analyzed, adjusted, and implemented.

As business problems become more complex, the need for a workflow-based solution has never been more...


Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Organize Your Digital Life: How to Store Your Photographs, Music, Videos, and Personal Documents in a Digital World
Organize Your Digital Life: How to Store Your Photographs, Music, Videos, and Personal Documents in a Digital World
Now that digital cameras and music players have become so incredibly widespread, a forest of sound and imagery is blossoming in our homes. We’ve got digital pictures in the camera, scans on the computer, JPEGS attached to e-mails, and tunes on tiny players. But there’s also the old-fashioned stuff: photos in shoeboxes, videos in the...
A Twist of the Wrist 2: The Basics of High-Performance Motorcycle Riding
A Twist of the Wrist 2: The Basics of High-Performance Motorcycle Riding
Straight facts about riding! A Twist of the Wrist, the acknowledged number one book on rider improvement for ten years straight, brought riders worldwide to a new understanding of vital riding skills. Uncovers and traces, action by action, the direct links between man and machine.

The thrill of motorcycle racing tugs at the
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy