A computer forensics "how-to" for fighting malicious code and analyzing incidents
With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
"synopsis" may belong to another edition of this title.
Powerful, step-by-step solutions to dozens of common threats
We called this a cookbook because each "recipe" presents both the ingredients and the steps you take to resolve a specific problem or research a given threat. On the DVD, you'll find supporting files and original programs that provide additional resources. You'll learn how to analyze malware using tools written by the authors as well as hundreds of other publicly available tools. If your job involves incident response, computer forensics, systems security, or antivirus research, this book will become invaluable to you.
Learn to conduct online investigations without revealing your identity
Use honeypots to collect malware being distributed by bots and worms
Build a low-budget malware lab with virtualization or bare bones hardware
Reverse engineer common encoding and encryption algorithms
Set up an advanced memory forensics platform for malware analysis
Investigate prevalent threats such as Zeus, Silent Banker, CoreFlood, Conficker, Virut, Clampi, Bankpatch, BlackEnergy, and many more!
On the DVD
Use the files on the DVD to follow along with the recipes or to conduct your own investigations and analyses. You will find:
Windows and Linux tools
Over 50 original programs in Python, C/C++, and Perl
"The most useful technical security book I've read this year. A must-have for all who protect systems from malicious software."
—Lenny Zeltser, Security Practice Director at Savvis and Senior Faculty Member at SANS Institute
"The ultimate guide for anyone interested in malware analysis."
—Ryan Olson, Director, VeriSign iDefense Rapid Response Team
"Every page is filled with practical malware knowledge, innovative ideas, and useful tools. Worth its weight in gold!"
—AAron Walters, Lead Developer of Volatility and VP of Security R&D at Terremark
Michael Hale Ligh is a malicious code analyst at Verisign iDefense and Chief of Special Projects at MNIN Security.
Steven Adair is a member of the Shadowserver Foundation and frequently analyzes malware and tracks botnets. He also investigates cyber attacks of all kinds with an emphasis on those linked to cyber espionage.
Blake Hartstein is the author of multiple security tools and a Rapid Response Engineer at Verisign iDefense, where he responds to malware incidents.
Matthew Richard has authored numerous security tools and also ran a managed security service for banks and credit unions.
"About this title" may belong to another edition of this title.
Book Description Wiley, 2010. Soft cover. Book Condition: New. International Edition. 744pp. Book cover and ISBN different from US edition. Territorial Restrictions maybe printed on the book. This is an international edition. Bookseller Inventory # 327389
Book Description Softcover. Book Condition: New. 1st edition. Brand NEW, Paperback International Edition. Black & White or color, Cover and ISBN may be different but similar contents as US editions. Standard delivery takes 5-9 business days by USPS with tracking number. Choose expedited shipping for superfast delivery 2-4 business days by DHL/FEDEX. We also ship to PO Box addresses but by Standard delivery. International Edition Textbooks may bear a label -Not for sale in the U.S. or Canada- etc. printed only to discourage U.S. students from obtaining an affordable copy. Legal to use despite any disclaimer on cover as per US court. No access code or CD included unless specified. In some instances, the international textbooks may have different exercises at the end of the chapters. Printed in English. 100% Customer satisfaction guaranteed! Please feel free to contact us for any queries. Bookseller Inventory # LPBD31561005
Book Description Paperback. Book Condition: New. New condition. Softcover book, 1st Edition. (Read Description Before Buying), This is an international Edition. Black and White Book. ISBN or covers May Be Different From US Edition. Book may have Restricted Sales Disclaimer Wordings printed on cover. Books May Be Shipped From Overseas as per stock status. Bookseller Inventory # 760426
Book Description Paperback. Book Condition: New. Softcover Book, New Condition, Fast Shipping. Ready in Stock. 1st Edition. [Please Read Carefully Before Buying], This Is An International Edition. Printed In Black and White. 744 Pages, Book Cover And ISBN No May Be Different From US Edition. Restricted Sales Disclaimer Wordings Not For Sales In USA And Canada May Be Printed On The Cover Of The Book. Standard Shipping 7-14 Business Days. Expedited Shiping 4-8 Business Days. ***WE DO NOT ENTERTAIN BULK ORDERS.*** The Books May Be Ship From Overseas For Inventory Purpose. Bookseller Inventory # 459356
Book Description Paperback. Book Condition: New. New, Softcover International Edition, Printed in Black and White, Only USPS Media mail Shipping ONLY, Different ISBN, Same Content As US edition, Book Cover may be Different, in English Language. Bookseller Inventory # 29142
Book Description 2010. PAP. Book Condition: New. New Book. Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # KB-9780470613030
Book Description John Wiley and Sons. Book Condition: New. Brand New. Bookseller Inventory # 0470613033
Book Description John Wiley and Sons Ltd, United Kingdom, 2010. Digital. Book Condition: New. 1. Auflage. Language: English . Brand New Book. A computer forensics how-to for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyware, rootkits, adware, and other invasivesoftware. Written by well-known malware experts, this guide revealssolutions to numerous problems and includes a DVD of customprograms and tools that illustrate the concepts, enhancing yourskills. * Security professionals face a constant battle against malicioussoftware; this practical manual will improve your analyticalcapabilities and provide dozens of valuable and innovativesolutions * Covers classifying malware, packing and unpacking, dynamicmalware analysis, decoding and decrypting, rootkit detection,memory forensics, open source malware research, and much more * Includes generous amounts of source code in C, Python, and Perlto extend your favorite tools or build new ones, and customprograms on the DVD to demonstrate the solutions Malware Analyst s Cookbook is indispensible to ITsecurity administrators, incident responders, forensic analysts,and malware researchers. Bookseller Inventory # AAH9780470613030
Book Description Wiley. PAPERBACK. Book Condition: New. 0470613033 *BRAND NEW* Ships Same Day or Next!. Bookseller Inventory # NATARAJB1FI934884
Book Description 2010. PAP. Book Condition: New. New Book.Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # IB-9780470613030