Windows Malware analysis essentials :: master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set /
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly cod...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
[2015]
|
Schriftenreihe: | Professional expertise distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781785287633 178528763X |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn922588654 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150930t20152015enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d N$T |d TEFOD |d OCLCF |d OCLCO |d IDEBK |d YDXCP |d DEBBG |d COO |d OCLCA |d EBLCP |d VT2 |d DEBSZ |d IDB |d OCLCQ |d MERUC |d OCLCQ |d OCLCO |d OCLCA |d CEF |d OCLCA |d OCLCQ |d OCLCO |d WYU |d UAB |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 919871927 |a 920446758 |a 935250164 |a 1259232231 | ||
020 | |a 9781785287633 |q (electronic bk.) | ||
020 | |a 178528763X |q (electronic bk.) | ||
020 | |z 9781785281518 | ||
020 | |z 1785281518 | ||
035 | |a (OCoLC)922588654 |z (OCoLC)919871927 |z (OCoLC)920446758 |z (OCoLC)935250164 |z (OCoLC)1259232231 | ||
037 | |a CL0500000648 |b Safari Books Online | ||
037 | |a F2EE4473-2A9C-4354-A2B0-1836672B7CC7 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.76.C68 | |
072 | 7 | |a COM |x 015000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Marak, Victor, |e author. | |
245 | 1 | 0 | |a Windows Malware analysis essentials : |b master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / |c Victor Marak. |
246 | 3 | 0 | |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Professional expertise distilled | |
500 | |a Includes index. | ||
588 | 0 | |a Online resource; title from cover page (Safari, viewed September 25, 2015). | |
520 | |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... | ||
630 | 0 | 0 | |a Microsoft Windows (Computer file) |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
650 | 0 | |a Malware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh2009005103 | |
650 | 0 | |a Computer viruses. |0 http://id.loc.gov/authorities/subjects/sh88004897 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 6 | |a Logiciels malveillants. | |
650 | 6 | |a Virus informatiques. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Security |x Viruses. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Malware (Computer software) |2 fast | |
758 | |i has work: |a Windows Malware Analysis Essentials (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXXFFhGVqjFrGfhFpfycfq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Marak, Victor. |t Windows Malware Analysis Essentials. |d Birmingham : Packt Publishing Ltd, ©2015 |z 9781785281518 |
830 | 0 | |a Professional expertise distilled. |0 http://id.loc.gov/authorities/names/no2015143013 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1059274 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL4191257 | ||
938 | |a EBSCOhost |b EBSC |n 1059274 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis32509663 | ||
938 | |a YBP Library Services |b YANK |n 12596700 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn922588654 |
---|---|
_version_ | 1816882325243297792 |
adam_text | |
any_adam_object | |
author | Marak, Victor |
author_facet | Marak, Victor |
author_role | aut |
author_sort | Marak, Victor |
author_variant | v m vm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C68 |
callnumber-search | QA76.76.C68 |
callnumber-sort | QA 276.76 C68 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)922588654 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05799cam a2200673 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn922588654</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">150930t20152015enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBBG</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">EBLCP</subfield><subfield code="d">VT2</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">919871927</subfield><subfield code="a">920446758</subfield><subfield code="a">935250164</subfield><subfield code="a">1259232231</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785287633</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178528763X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785281518</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1785281518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)922588654</subfield><subfield code="z">(OCoLC)919871927</subfield><subfield code="z">(OCoLC)920446758</subfield><subfield code="z">(OCoLC)935250164</subfield><subfield code="z">(OCoLC)1259232231</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000648</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">F2EE4473-2A9C-4354-A2B0-1836672B7CC7</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.C68</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marak, Victor,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows Malware analysis essentials :</subfield><subfield code="b">master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set /</subfield><subfield code="c">Victor Marak.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover page (Safari, viewed September 25, 2015).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t...</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2009005103</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88004897</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels malveillants.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Virus informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Viruses.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Windows Malware Analysis Essentials (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXXFFhGVqjFrGfhFpfycfq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Marak, Victor.</subfield><subfield code="t">Windows Malware Analysis Essentials.</subfield><subfield code="d">Birmingham : Packt Publishing Ltd, ©2015</subfield><subfield code="z">9781785281518</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Professional expertise distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015143013</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1059274</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4191257</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1059274</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis32509663</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12596700</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn922588654 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:48Z |
institution | BVB |
isbn | 9781785287633 178528763X |
language | English |
oclc_num | 922588654 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing, |
record_format | marc |
series | Professional expertise distilled. |
series2 | Professional expertise distilled |
spelling | Marak, Victor, author. Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / Victor Marak. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Birmingham, UK : Packt Publishing, [2015] ©2015 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Professional expertise distilled Includes index. Online resource; title from cover page (Safari, viewed September 25, 2015). Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Logiciels malveillants. Virus informatiques. Sécurité informatique. COMPUTERS Security Viruses. bisacsh Computer security fast Computer viruses fast Malware (Computer software) fast has work: Windows Malware Analysis Essentials (Text) https://id.oclc.org/worldcat/entity/E39PCXXFFhGVqjFrGfhFpfycfq https://id.oclc.org/worldcat/ontology/hasWork Print version: Marak, Victor. Windows Malware Analysis Essentials. Birmingham : Packt Publishing Ltd, ©2015 9781785281518 Professional expertise distilled. http://id.loc.gov/authorities/names/no2015143013 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1059274 Volltext |
spellingShingle | Marak, Victor Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / Professional expertise distilled. Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Logiciels malveillants. Virus informatiques. Sécurité informatique. COMPUTERS Security Viruses. bisacsh Computer security fast Computer viruses fast Malware (Computer software) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2009005103 http://id.loc.gov/authorities/subjects/sh88004897 http://id.loc.gov/authorities/subjects/sh90001862 |
title | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / |
title_alt | Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
title_auth | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / |
title_exact_search | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / |
title_full | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / Victor Marak. |
title_fullStr | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / Victor Marak. |
title_full_unstemmed | Windows Malware analysis essentials : master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / Victor Marak. |
title_short | Windows Malware analysis essentials : |
title_sort | windows malware analysis essentials master the fundamentals of malware analysis for the windows platform and enhance your anti malware skill set |
title_sub | master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set / |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Logiciels malveillants. Virus informatiques. Sécurité informatique. COMPUTERS Security Viruses. bisacsh Computer security fast Computer viruses fast Malware (Computer software) fast |
topic_facet | Microsoft Windows (Computer file) Malware (Computer software) Computer viruses. Computer security. Logiciels malveillants. Virus informatiques. Sécurité informatique. COMPUTERS Security Viruses. Computer security Computer viruses |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1059274 |
work_keys_str_mv | AT marakvictor windowsmalwareanalysisessentialsmasterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset AT marakvictor masterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset |