Nuevo:
-29% US$38.86
Entrega el jueves, 17 de octubre
Enviado por: Amazon.com
Vendido por: Amazon.com
US$38.86 con 29 porcentaje de ahorro
Precio recomendado: US$54.99
El Precio listado es el precio de venta sugerido de un nuevo producto tal como lo proporciona un fabricante, proveedor o vendedor. Excepto para los libros, Amazon mostrará un Precio listado si los clientes compraron el producto en Amazon o si otros minoristas lo ofrecieron al Precio listado o a un precio superior al menos en los últimos 90 días. Los precios listados pueden no reflejar necesariamente el precio de mercado actual del producto.
Más información
Devoluciones internacionales gratis
US$11.68 de cargos de envío e importación a Canadá Detalles

Detalles de envío y tarifa

Precio US$38.86
Envío de AmazonGlobal US$9.66
Cargos estimados de importación US$2.02
Total US$50.54

Entrega el jueves, 17 de octubre. Realiza el pedido en 21 hrs 27 mins
Disponible
US$US$38.86 () Incluye las opciones seleccionadas. Incluye el pago mensual inicial y las opciones seleccionadas. Detalles
Precio
Subtotal
US$US$38.86
Subtotal
Desglose inicial del pago
Se muestran los gastos de envío, la fecha de entrega y el total del pedido (impuestos incluidos) al finalizar la compra
Enviado por
Amazon.com
Enviado por
Amazon.com
Vendido por
Amazon.com
Vendido por
Amazon.com
Devoluciones
Reintegro o reemplazo en 30 días
Reintegro o reemplazo en 30 días
Este artículo se puede devolver en su estado original para obtener un reintegro o reemplazo completo dentro de los 30 días posteriores a la recepción.
Devoluciones
Reintegro o reemplazo en 30 días
Este artículo se puede devolver en su estado original para obtener un reintegro o reemplazo completo dentro de los 30 días posteriores a la recepción.
Pago
Transacción segura
Tu transacción es segura
En Amazon, nos esforzamos por proteger tu seguridad y privacidad. Nuestro sistema de seguridad de pagos encripta tu información durante la transmisión de datos. No compartimos los datos de tu tarjeta de crédito con vendedores externos, ni vendemos tu información a terceros. Más información
Pago
Transacción segura
En Amazon, nos esforzamos por proteger tu seguridad y privacidad. Nuestro sistema de seguridad de pagos encripta tu información durante la transmisión de datos. No compartimos los datos de tu tarjeta de crédito con vendedores externos, ni vendemos tu información a terceros. Más información
US$34.97
Devoluciones internacionales gratis
The item shows wear from use, but it remains in good condition.It may have identifying markings on it, or have minor cosmetic wear. The item shows wear from use, but it remains in good condition.It may have identifying markings on it, or have minor cosmetic wear. Ver menos
Entrega entre el 21 - 23 de octubre
Solo queda(n) 1 en stock (hay más unidades en camino).
US$US$38.86 () Incluye las opciones seleccionadas. Incluye el pago mensual inicial y las opciones seleccionadas. Detalles
Precio
Subtotal
US$US$38.86
Subtotal
Desglose inicial del pago
Se muestran los gastos de envío, la fecha de entrega y el total del pedido (impuestos incluidos) al finalizar la compra
No se garantizan códigos de acceso ni suplementos con artículos usados.
Agregado a

Lo sentimos; hubo un problema.

Hubo un error al recuperar tus Listas de Deseos. Por favor inténtalo de nuevo.

Lo sentimos; hubo un problema.

Lista no disponible.
Imagen del logotipo de la aplicación Kindle

Descarga la app de Kindle gratis y comienza a leer libros Kindle al instante desde tu smartphone, tablet o computadora, sin necesidad de ningún dispositivo Kindle.

Lee al instante desde tu navegador con Kindle para la web.

Usando la cámara de tu celular escanea el siguiente código y descarga la aplicación Kindle.

Código QR para descargar la App Kindle

Seguir al autor

Ocurrió un error. Intenta realizar tu solicitud de nuevo más tarde.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

4.7 4.7 de 5 estrellas 154 calificaciones

en 3 producto(s) Términos
{"desktop_buybox_group_1":[{"displayPrice":"US$38.86","priceAmount":38.86,"currencySymbol":"US$","integerValue":"38","decimalSeparator":".","fractionalValue":"86","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"jGuPAMpjRRgYEK4N0CQYLE2AoAdkFdBmfOwZRA6%2Ffm6k6yMyqwgzzhoiaJiL324qgyV8vFV3i2rK2pOQR5n3OAzqudJOCyMurvTCIWOAPnHsmwpNiIb0rfBN9faQec%2BGalbgWV1o%2FbRt4c1nt3Aczw%3D%3D","locale":"es-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"US$34.97","priceAmount":34.97,"currencySymbol":"US$","integerValue":"34","decimalSeparator":".","fractionalValue":"97","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"jGuPAMpjRRgYEK4N0CQYLE2AoAdkFdBmJqtQ4I3Udj5VSrOyqLh%2B%2FHIdfeisR4EevSvmMK8xKJ4v7Rhxvarb%2BTDStFES9zKm7MGThGZ%2BWQ6PJcT%2B%2FCQZFAQGopb18kz1vdkbuVdXBzZPpMAuu7Rz0GIJZL91t5Zxz%2Foued5HMQDCh0bHqnLvUs3MYYhJ2NFF","locale":"es-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Opciones de compra y productos Add-on

Understand malware analysis and its practical implementation


Key Features:

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand adversary tactics and techniques


Book Description:

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.


This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.


This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.


What You Will Learn:

  • Create a safe and isolated lab environment for malware analysis
  • Extract the metadata associated with malware
  • Determine malware's interaction with the system
  • Perform code analysis using IDA Pro and x64dbg
  • Reverse-engineer various malware functionalities
  • Reverse engineer and decode common encoding/encryption algorithms
  • Reverse-engineer malware code injection and hooking techniques
  • Investigate and hunt malware using memory forensics


Who this book is for:

This book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get most out of this book.

Comprados juntos habitualmente

Este producto: Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
US$38.86
Disponible
Vendido y enviado por Amazon.com.
+
US$43.12
Disponible
Vendido y enviado por Amazon.com.
+
US$42.14
Disponible
Vendido y enviado por Amazon.com.
Precio total: $00
Para consultar nuestro precio, agrega estos elementos a tu carrito
Detalles
Agregado al carrito
spCSRF_Treatment
Elige artículos para comprar juntos.

Opiniones editoriales

Biografía del autor

Monnappa K A works for Cisco Systems as an information security investigator focusing on threat intelligence and the investigation of advanced cyber attacks. He is a member of the Black Hat review board, the creator of Limon Linux sandbox, the winner of the Volatility plugin contest 2016, and the co-founder of the Cysinfo cybersecurity research community. He has presented and conducted training sessions at various security conferences including Black Hat, FIRST, OPCDE, and DSCI. He regularly conducts training at the Black Hat Security Conference in USA, Asia, and Europe.

Detalles del producto

  • Editorial ‏ : ‎ Packt Publishing (29 Junio 2018)
  • Idioma ‏ : ‎ Inglés
  • Tapa blanda ‏ : ‎ 510 páginas
  • ISBN-10 ‏ : ‎ 1788392507
  • ISBN-13 ‏ : ‎ 978-1788392501
  • Dimensiones ‏ : ‎ 9.25 x 7.5 x 1.06 pulgadas
  • Opiniones de clientes:
    4.7 4.7 de 5 estrellas 154 calificaciones

Sobre el autor

Sigue a los autores para recibir notificaciones de sus nuevas obras, así como recomendaciones mejoradas.
Monnappa K A
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Monnappa K A is a Security professional with over 15 years of experience in incident response, investigation, and threat hunting. He previously worked for Microsoft & Cisco as a threat hunter and incident responder, mainly focusing on threat hunting, investigation, and research of advanced cyber attacks. He is the review board member for Black Hat Asia, Black Hat USA, and Black Hat Europe.

He frequently conducts malware analysis and threat-hunting training titled "A Complete Practical Approach to Malware Analysis & Memory Forensics" at Black Hat Asia, Black Hat USA, Black MEA, Black Hat Europe, BruCON, and HITB conferences. He has presented at various security conferences, including Black Hat, FIRST, SEC T, 4SICS SCADA/ICS summit, DSCI, National Cyber Defence Summit, and Cysinfo meetings on various topics related to memory forensics, malware analysis, reverse engineering, and rootkit analysis.

He is the creator of the Limon Linux sandbox and the winner of the Volatility plugin contest 2016. He co-founded the cybersecurity research community "Cysinfo" (https://www.cysinfo.com). He has also authored various articles in eForensics and Hakin9 magazines.

You can find some of his contributions to the community in his YouTube channel (http://www.youtube.com/c/MonnappaKA), and he publishes blog posts at Cysinfo community website: https://cysinfo.com

Twitter: monnappa22

Linkedin: https://www.linkedin.com/in/monnappaka1b845a42

Opiniones de clientes

4.7 de 5 estrellas
154 calificaciones globales

Opiniones destacadas de los Estados Unidos

Calificado en Estados Unidos el 20 de julio de 2018
The layout of the book is well thought out. The book is well-written with many screenshots and examples. Every chapter includes a detailed explanation of the concepts and various tools. Whether new to the field of malware analysis or experienced professionals, it offers something for everyone. The first three chapters show how to set up a lab environment then covers basic malware analysis concepts which is suitable for anyone new to the field. The rest of the chapters focus on reverse engineering concepts and memory forensics. Before getting into complex reverse engineering topics it ramps you up by covering the basics of assembly language and the disassembly, the approach used to explain the assembly concepts is impressive and makes it very easy to understand it. It then shows you how to use code analysis tools such as IDA and x64dbg for disassembly and debugging, After which it covers various malware techniques such as persistence, code injection, and obfuscation with real examples. The last two chapters are dedicated to memory forensics using Volatility framework which gives a detailed overview of malware forensic investigation. Overall this an excellent book and a highly recommended buy.
Calificado en Estados Unidos el 9 de octubre de 2018
Very good book to read for any level of Malware Analysis skills. Beginners to Malware Analysis will appreciate the Chapters on Assembly and IDA PRO should they have struggles learning such concepts being beginners. For more advanced Analysts, it is a good reference.
I like the Memory Forensics chapters, being that I am a huge user of the Volatility Framework. Overall the format is good and the progression of the Chapters is smooth!
I recommend this book as a must read if you wish to delve into Malware Analysis and its different methodologies!
Props to the Author!
A 11 personas les resultó útil
Reportar
Calificado en Estados Unidos el 24 de febrero de 2020
Outstanding content, very clear and thorough instructions with examples to match. The fact that there are assembly instructions along with malware samples makes my heart sing. 100% recommend this resource alongside Practical Malware Analysis.
Calificado en Estados Unidos el 15 de septiembre de 2019
Goes for breadth on the subject and does a good job hitting on a lot of examples. This makes it easy to read and follow along. Definitely recommend for beginners or those with gaps that want to solidify their foundation.
Calificado en Estados Unidos el 13 de agosto de 2019
I enjoyed this book, it has the right amount of theory and practice and its updated with the latest content as well. Very well written. Thank you.
Calificado en Estados Unidos el 15 de diciembre de 2020
I have a decent amount of general cybersecurity knowledge but nothing in malware analysis so I found this book a great starting point. There are a lot of good explanations for describing the various malware investigation techniques as well as the most common ways malware works. My only issue is that some of the links referenced in the book do not exist any more. These were not critical to the learning material in the book but rather supplemental learning.
Calificado en Estados Unidos el 22 de agosto de 2020
Really good book. Author does a good job explaining things efficiently, keeping interest, etc. I would definitely recommend.
Calificado en Estados Unidos el 24 de octubre de 2020
Covers, in the appropriate depth, every topic of malware analysis I wanted. If you need a book to get smart on the topic, this is the go-to book, in my opinion. You won't be disappointed.

Opiniones más destacadas de otros países

Traducir todas las opiniones al Español
Sotona Henry
5.0 de 5 estrellas Static and Dynamic analysis
Calificado en Reino Unido el 28 de agosto de 2023
Fantastic book
jesus
5.0 de 5 estrellas Muy útil
Calificado en España el 31 de marzo de 2021
Un libro de gran utilidad, el envoltorio no vino en buen estado.
Janina Keller
5.0 de 5 estrellas Top
Calificado en Alemania el 2 de febrero de 2020
Buch top Zustand, keine Mängel, keine Probleme.
K.Venkatesh Murthy
5.0 de 5 estrellas Best book available for learning Malware Analysis till date !
Calificado en India el 28 de octubre de 2018
Excellent resource for those aspiring to learn Malware analysis. The book is nicely written covering the fundamental concepts of malware behaviour and characteristics. The highlight of the book is the visual diagrams and written language which help the user to easily understand the complex technical matters. Chapters 1-3 provides basic foundation to further understand the advanced topics covered in the rest of the book.
This book is a greatest contribution to the security community !!!
Amazon カスタマー
5.0 de 5 estrellas 親切で丁寧。訳本も出た。
Calificado en Japón el 19 de diciembre de 2020
マルウェアとは、解析方法とは、その手法や技術とは?
それらの疑問に答えてくれる素晴らしい書籍です。
日本語訳版である「初めてのマルウェア解析」が2020年12月に出版されていますので、日本人はそちらを購入することをオススメします。
ほんとうに「はじめて」学習する方には、バイナリなどのやや習得が厳しい項目がある点には注意してください。