Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion
Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …
Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …
Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …
Detecting malware adn threats in windows, linux and Mac
Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer Basic Static Techniques < >Antivirus Scanning: A Useful First Step < >Hashing: A Fingerprint for Malware < >Finding Strings < >Packed and Obfuscated Malware < >Portable Executable File Format < >Linked Libraries and Functions < >Static Ana…
Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer Basic Static Techniques < >Antivirus Scanning: A Useful First Step < >Hashing: A Fingerprint for Malware < >Finding Strings < >Packed and Obfuscated Malware < >Portable Executable File Format < >Linked Libraries and Functions < >Static Ana…