Hot Best Seller

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Availability: Ready to download

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.


Compare

A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

30 review for Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

  1. 5 out of 5

    Ayoub

    long and informative journey through this guide, can't find better technical book when it comes to the nice blend between theory and practice. It dives deep into the detailed (static and dynamic) analysis of malware despite the platform. Discusses diversity of tools utilized across the security field including, forensics, pen testing and analysis. Provides specialists with recipes of how-to and do-to. In short, amazing and highly recommended. long and informative journey through this guide, can't find better technical book when it comes to the nice blend between theory and practice. It dives deep into the detailed (static and dynamic) analysis of malware despite the platform. Discusses diversity of tools utilized across the security field including, forensics, pen testing and analysis. Provides specialists with recipes of how-to and do-to. In short, amazing and highly recommended.

  2. 5 out of 5

    Scott Holstad

    Actually a pretty good resource. Comprehensive and recommended.

  3. 5 out of 5

    M

    Must better material available elsewhere.

  4. 5 out of 5

    Abhinav Singh

    The content of the book is very well organized. It can be a good starting point for someone who is new to Malware analysis but it might fall short of expectations for experienced people. The reason is because the major content of the book revolves around using different tools to perform certain task. The book could have reached to an advance level by detailing the last few chapters involving static analysis, debugging etc.

  5. 4 out of 5

    Justin

    Good but too much Volatility Overall it was a really good book but the last couple of chapters focus completely on volatility and not too well if you want better understanding of memory forensics including malware just look at the book the Art of Memory Forensics

  6. 5 out of 5

    Mindaugas N.

    Perfection, Thanks for this book!

  7. 5 out of 5

    Bill Dean

    Excellent book on malware analysis and techniques. The DVD that comes with it is incredibly helpful as well due to the amount of time that it saves inputting code for analysis.

  8. 5 out of 5

    Viperh

  9. 5 out of 5

    Jeremy Borkowsky

  10. 5 out of 5

    Jake

  11. 5 out of 5

    Jonathan Leong

  12. 5 out of 5

    Dan

  13. 5 out of 5

    Freddie Barr-Smith

  14. 5 out of 5

    Kelly Doyle

  15. 4 out of 5

    Jelle

  16. 4 out of 5

    Richard Chamberlain

  17. 5 out of 5

    Penelope

  18. 5 out of 5

    Carter

  19. 4 out of 5

    Jason Haddix

  20. 4 out of 5

    Scott Brown

  21. 5 out of 5

    Jeremy Cooke

  22. 5 out of 5

    Ignacio Rodriguez Paez

  23. 5 out of 5

    Athanasios

  24. 4 out of 5

    Bryan Cochrane

  25. 4 out of 5

    William Alexander

  26. 5 out of 5

    Aref Billah

  27. 5 out of 5

    Mike Wilson

  28. 5 out of 5

    Binary

  29. 4 out of 5

    Ghaith

  30. 4 out of 5

    Rupak Hazarika

Add a review

Your email address will not be published. Required fields are marked *

Loading...