Nuevo:
-29% US$38.86US$38.86
Entrega el jueves, 17 de octubre
Enviado por: Amazon.com Vendido por: Amazon.com
Ahorra con Usado - Bueno
US$34.97US$34.97
Entrega entre el 21 - 23 de octubre
Enviado por: Amazon Vendido por: Yellow Raccoon
Descarga la app de Kindle gratis y comienza a leer libros Kindle al instante desde tu smartphone, tablet o computadora, sin necesidad de ningún dispositivo Kindle.
Lee al instante desde tu navegador con Kindle para la web.
Usando la cámara de tu celular escanea el siguiente código y descarga la aplicación Kindle.
Imagen no disponible
Color:
-
-
-
- Para ver la descarga de este video Flash Player
Seguir al autor
Aceptar
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Opciones de compra y productos Add-on
Understand malware analysis and its practical implementation
Key Features:
- Explore the key concepts of malware analysis and memory forensics using real-world examples
- Learn the art of detecting, analyzing, and investigating malware threats
- Understand adversary tactics and techniques
Book Description:
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.
This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.
This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.
What You Will Learn:
- Create a safe and isolated lab environment for malware analysis
- Extract the metadata associated with malware
- Determine malware's interaction with the system
- Perform code analysis using IDA Pro and x64dbg
- Reverse-engineer various malware functionalities
- Reverse engineer and decode common encoding/encryption algorithms
- Reverse-engineer malware code injection and hooking techniques
- Investigate and hunt malware using memory forensics
Who this book is for:
This book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get most out of this book.
- ISBN-101788392507
- ISBN-13978-1788392501
- EditorialPackt Publishing
- Fecha de publicación29 Junio 2018
- IdiomaInglés
- Dimensiones9.25 x 7.5 x 1.06 pulgadas
- Número de páginas510 páginas
Comprados juntos habitualmente

Los clientes que compraron este producto también compraron
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern MalwareTapa blandaUS$9.66 de envíoSólo hay 3 disponible(s).
Opiniones editoriales
Biografía del autor
Detalles del producto
- Editorial : Packt Publishing (29 Junio 2018)
- Idioma : Inglés
- Tapa blanda : 510 páginas
- ISBN-10 : 1788392507
- ISBN-13 : 978-1788392501
- Dimensiones : 9.25 x 7.5 x 1.06 pulgadas
- Clasificación en los más vendidos de Amazon: nº829,655 en Libros (Ver el Top 100 en Libros)
- nº180 en Libros sobre Arquitectura de Sistemas
- nº1,975 en Seguridad y Cifrado Informáticos
- nº3,154 en Profesional
- Opiniones de clientes:
Sobre el autor

Monnappa K A is a Security professional with over 15 years of experience in incident response, investigation, and threat hunting. He previously worked for Microsoft & Cisco as a threat hunter and incident responder, mainly focusing on threat hunting, investigation, and research of advanced cyber attacks. He is the review board member for Black Hat Asia, Black Hat USA, and Black Hat Europe.
He frequently conducts malware analysis and threat-hunting training titled "A Complete Practical Approach to Malware Analysis & Memory Forensics" at Black Hat Asia, Black Hat USA, Black MEA, Black Hat Europe, BruCON, and HITB conferences. He has presented at various security conferences, including Black Hat, FIRST, SEC T, 4SICS SCADA/ICS summit, DSCI, National Cyber Defence Summit, and Cysinfo meetings on various topics related to memory forensics, malware analysis, reverse engineering, and rootkit analysis.
He is the creator of the Limon Linux sandbox and the winner of the Volatility plugin contest 2016. He co-founded the cybersecurity research community "Cysinfo" (https://www.cysinfo.com). He has also authored various articles in eForensics and Hakin9 magazines.
You can find some of his contributions to the community in his YouTube channel (http://www.youtube.com/c/MonnappaKA), and he publishes blog posts at Cysinfo community website: https://cysinfo.com
Twitter: monnappa22
Linkedin: https://www.linkedin.com/in/monnappaka1b845a42
Opiniones de clientes
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella5 estrellas84%8%5%3%0%84%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella4 estrellas84%8%5%3%0%8%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella3 estrellas84%8%5%3%0%5%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella2 estrellas84%8%5%3%0%3%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella1 estrella84%8%5%3%0%0%
Las opiniones de clientes, incluidas las valoraciones de productos ayudan a que los clientes conozcan más acerca del producto y decidan si es el producto adecuado para ellos.
Para calcular la valoración global y el desglose porcentual por estrella, no utilizamos un promedio simple. En cambio, nuestro sistema considera cosas como la actualidad de la opinión y si el revisor compró el producto en Amazon. También analiza las opiniones para verificar la confiabilidad.
Más información sobre cómo funcionan las opiniones de clientes en Amazon-
Opiniones principales
Opiniones destacadas de los Estados Unidos
Ha surgido un problema al filtrar las opiniones justo en este momento. Vuelva a intentarlo en otro momento.
I like the Memory Forensics chapters, being that I am a huge user of the Volatility Framework. Overall the format is good and the progression of the Chapters is smooth!
I recommend this book as a must read if you wish to delve into Malware Analysis and its different methodologies!
Props to the Author!
Opiniones más destacadas de otros países
This book is a greatest contribution to the security community !!!
それらの疑問に答えてくれる素晴らしい書籍です。
日本語訳版である「初めてのマルウェア解析」が2020年12月に出版されていますので、日本人はそちらを購入することをオススメします。
ほんとうに「はじめて」学習する方には、バイナリなどのやや習得が厳しい項目がある点には注意してください。






