Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Sold by John Wiley & Sons
6
Free sample

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.

  • Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
  • Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
  • Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions

Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Read more

About the author

Michael Hale Ligh is a malicious code analyst at Verisign iDefense and Chief of Special Projects at MNIN Security.

Steven Adair is a member of the Shadowserver Foundation and frequently analyzes malware and tracks botnets. He also investigates cyber attacks of all kinds with an emphasis on those linked to cyber espionage.

Blake Hartstein is the author of multiple security tools and a Rapid Response Engineer at Verisign iDefense, where he responds to malware incidents.

Matthew Richard has authored numerous security tools and also ran a managed security service for banks and credit unions.

Read more

Reviews

4.7
6 total
Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Published on
Sep 29, 2010
Read more
Pages
744
Read more
ISBN
9781118003367
Read more
Language
English
Read more
Genres
Computers / Networking / General
Computers / Security / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Dafydd Stuttard
Defend your networks and data from attack with this unique two-book security set

The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s Handbook and Malware Analyst’s Cookbook. This special security bundle combines coverage of the two most crucial tactics used to defend networks, applications, and data from attack while giving security professionals insight into the underlying details of these attacks themselves.

The Web Application Hacker's Handbook takes a broad look at web application security and exposes the steps a hacker can take to attack an application, while providing information on how the application can defend itself. Fully updated for the latest security trends and threats, this guide covers remoting frameworks, HTML5, and cross-domain integration techniques along with clickjacking, framebusting, HTTP parameter pollution, XML external entity injection, hybrid file attacks, and more.

The Malware Analyst's Cookbook includes a book and DVD and is designed to enhance the analytical capabilities of anyone who works with malware. Whether you’re tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you go beyond the basic tools for tackling security challenges to cover how to extend your favorite tools or build your own from scratch using C, Python, and Perl source code. The companion DVD features all the files needed to work through the recipes in the book and to complete reverse-engineering challenges along the way.

The Attack and Defend Computer Security Set gives your organization the security tools needed to sound the alarm and stand your ground against malicious threats lurking online.

Kevin D. Mitnick
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Michael Hale Ligh
Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:

How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner

The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Matthew, Richard A.
In recent years, scholars in international relations and other fields have begun to conceive of security more broadly, moving away from a state-centered concept of national security toward the idea of human security, which emphasizes the individual and human well-being. Viewing global environmental change through the lens of human security connects such problems as melting ice caps and carbon emissions to poverty, vulnerability, equity, and conflict. This book examines the complex social, health, and economic consequences of environmental change across the globe. In chapters that are both academically rigorous and policy relevant, the book discusses the connections of global environmental change to urban poverty, natural disasters (with a case study of Hurricane Katrina), violent conflict (with a study of the decade-long Nepalese civil war), population, gender, and development. The book makes clear the inadequacy of traditional understandings of security and shows how global environmental change is raising new, unavoidable questions of human insecurity, conflict, cooperation, and sustainable development.

ContributorsW. Neil Adger, Jennifer Bailey, Jon Barnett, Victoria Basolo, Hans Georg Bohle, Mike Brklacich, May Chazan, Chris Cocklin, Geoffrey D. Dabelko, Indra de Soysa, Heather Goldsworthy, Betsy Hartmann, Robin M. Leichenko, Laura Little, Alexander L�pez, Richard A. Matthew, Bryan McDonald, Eric Neumayer, Kwasi Nsiah-Gyabaah, Karen L. O'Brien, Marvin S. Soroos, Bishnu Raj Upreti

Matthew Richard Schlimm
The basic message of the Bible can be understood in any language. At the same time, many biblical texts are hard to understand because they don’t quite make sense when translated into English. Something is missing. Quite frequently, what readers miss has been lost in translation. Maybe there is a pun or wordplay in the original. Sometimes names like Adam, Eve, Cain, Abel, and Eden just seem like names to us but have meanings that are essential to the story. Many Hebrew words have multiple meanings, but the English translators have to just pick one (for example, the same Hebrew word can mean both hear and obey). Even more common are Hebrew words that have much wider meanings than their English translations. A few examples are the Hebrew words rendered as remember, covenant, walk, gates, love, cleanliness, holiness, glory, wisdom, and fear. The original language allows various parts to click together like well-constructed puzzle pieces. With Hebrew in mind, interpreters see new details they didn’t realize were missing before. They make new connections. They immerse themselves in scripture more fully.

That’s where this book comes in. Learning a language is like learning a worldview. Those who learn Biblical Hebrew can better understand not only what biblical authors wrote, but also how they thought. Unfortunately, those insights come only after years of study. This book is about getting right to the important, exciting insights. It’s an opportunity to be transformed by the renewing of our minds as we better understand how biblical authors used their language to express their experience of God and the world.

If you are just beginning to study Hebrew and want the insights and motivation to continue or if you have no intention of learning biblical Hebrew but want to better understand the Bible, this book is for you!
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.