Daftar isi 1. Pendahuluan 2. menciptakan virus 3. benteng pertahanan 4. PC antivirus 5. Andorid antivirus 6. Data recovery 7. Pengobatan 8. Tips dan trik
Table of Contents Author's Note ix The Players xi Chapter 1 An Evening in San Francisco 1 Chapter 2 Texas T-Files 9 Chapter 3 The Cons 21 Chapter 4 Underground Boston 37 Chapter 5 Back Orifice 53 Chapter 6 One Million Dollars and a Monster Truck 71 Chapter 7 Oxblood 85 Chapter 8 Much @stake 107 Chapter 9 Tor and Citizen Lab 127 Chapter 10 Jake 139 Chapter 11 Mixter, Muench, and…
Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…
Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…
Daftar isi: BAB 1 Sekilas jaringan wireless BAB 2 Persiapan perang BAB 3 War driving BAB 4 Hidden SSID BAB 5 Disconnect komputer target BAB 6 Denial of service (DoS) BAB 7 Crack wep keys BAB 8 Crack WPA/WPA2 keys BAB 9 Melacak password tersembunyi BAB 10 MAC address filtering BAB 11 Melihat daftar klien access point BAB 12 Menyusup ke komputer lain BAB 13 Mengintip webs…
Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…
Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …
Daftar Isi: BAB 1 INSTALANSI ANTIVIRUS 1.1 Filtur Norton Antivirus 1.2 Intalansi Norton Antivirus 1.3 Memulai Norton Antivirus BAB 2 KONFIGURASI SCANNING 2.1 Pastikikan Protasi Otomatis 2.2 Proteksi Manual BAB 3 MELAKUKAN SEANNING 3.1 Run Full System Scen 3.2 Jadwal Full Scen 3.3 Norton Quickscen 3.4 Jadwal QuickScen 3.5 Scen All Removable Drive 3.6 Scen All Flo…
Contents 1. Through Hacker’s Eyes 2. Cryptovirology 3. Tools for Security and Insecurity 3.1 Sources of Entropy 3.2 Entropy Extraction via Hashing 3.3 Unbiasing a Biased Coin 3.4 Combining Weak Sources of Entropy 3.5 Pseudorandom Number Generators 3.6 Uniform Sampling 3.7 Random Permutation Generation 3.8 Sound Approach to Random Number Generation and Use 3.9 RNGs Are the Beati…
Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …