Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware /

Annotation

Saved in:
Bibliographic Details
Main Author: K. A., Monnappa (Author)
Format: eBook
Language:English
Published: Birmingham, UK : Packt Publishing, 2018.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 04692cam a2200517 i 4500
001 in00006078524
006 m o d
007 cr unu||||||||
008 180731s2018 enka o 000 0 eng d
005 20220713131358.1
035 |a 1WRLDSHRon1046682345 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d TOH  |d OCLCF  |d TEFOD  |d OCLCA  |d CEF  |d G3B  |d TEFOD  |d S9I  |d UAB  |d VT2  |d N$T  |d OCLCQ  |d OCLCO 
020 |a 9781788397520  |q (electronic bk.) 
020 |a 1788397525  |q (electronic bk.) 
020 |z 9781788392501 
020 |z 1788392507 
035 |a (OCoLC)1046682345 
037 |a CL0500000982  |b Safari Books Online 
037 |a 4C319DD5-A0D1-423B-A865-419DFEFBDCBE  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.76.C68 
082 0 4 |a 005.88  |2 23 
049 |a TXMM 
100 1 |a K. A., Monnappa,  |e author. 
245 1 0 |a Learning malware analysis :  |b explore the concepts, tools, and techniques to analyze and investigate Windows malware /  |c Monnappa K A. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 24, 2019) 
520 8 |a Annotation  |b Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents. What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get most out of this book. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast  |0 (OCoLC)fst01367862 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
650 0 |a Computer software  |x Evaluation. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781788392501/?ar  |z CONNECT  |3 O'Reilly 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 684396fc-9988-422a-8d96-154e1552dc53  |i ec042728-a198-4ae4-9f97-5498b68cee27 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |e QA76.76.C68   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781788392501/?ar  |z CONNECT