Sep

22

2020

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

Laser 22 Sep 2020 20:22 LEARNING » e-book

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
English | 2020 | ISBN-13: 978-1484261927 | 984 Pages | PDF, EPUB| 107.68 MB

Discover how the internals of malware work and how you can analyze and detect it.

You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Eeering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you.

The book starts with an introduction to malware analysis and reverse eeering to provide insight on the different types of malware and also the teology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.

The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.

What You Will Learn

Analyze, dissect, reverse eeer, and classify malware

Effectively handle malware with custom packers and compilers

Unpack complex malware to locate vital malware components and decipher their intent

Use various static and dynamic malware analysis tools

Leverage the internals of various detection eeering tools to improve your workflow

Write Snort rules and learn to use them with Suricata IDS

Who This Book Is For

Security professionals, malware analysts, SOC analysts, incident responders, detection eeers, reverse eeers, and network security eeers

"This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative



DOWNLOAD
uploadgig



rapidgator


nitroflare

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis