Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly cod...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Marak, Victor (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing [2015]
Schriftenreihe:Professional expertise distilled
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047693150
003 DE-627-1
005 20240228115939.0
007 cr uuu---uuuuu
008 191023s2015 xx |||||o 00| ||eng c
020 |a 9781785287633  |c electronic bk.  |9 978-1-78528-763-3 
020 |a 178528763X  |c electronic bk.  |9 1-78528-763-X 
020 |a 9781785281518  |9 978-1-78528-151-8 
035 |a (DE-627-1)047693150 
035 |a (DE-599)KEP047693150 
035 |a (ORHE)9781785281518 
035 |a (DE-627-1)047693150 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Marak, Victor  |e VerfasserIn  |4 aut 
245 1 0 |a Windows Malware analysis essentials  |b master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set  |c Victor Marak 
246 3 3 |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set 
264 1 |a Birmingham, UK  |b Packt Publishing  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Professional expertise distilled 
500 |a Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015) 
520 |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... 
630 2 0 |a Microsoft Windows (Computer file) 
650 0 |a Malware (Computer software) 
650 0 |a Computer viruses 
650 0 |a Computer security 
650 4 |a Microsoft Windows (Computer file) 
650 4 |a Logiciels malveillants 
650 4 |a Virus informatiques 
650 4 |a Sécurité informatique 
650 4 |a COMPUTERS ; Security ; Viruses 
650 4 |a Computer security 
650 4 |a Computer viruses 
650 4 |a Malware (Computer software) 
776 1 |z 9781785281518 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781785281518 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781785281518/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047693150
_version_ 1818767296148013056
adam_text
any_adam_object
author Marak, Victor
author_facet Marak, Victor
author_role aut
author_sort Marak, Victor
author_variant v m vm
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047693150
(DE-599)KEP047693150
(ORHE)9781785281518
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04665cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-047693150</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115939.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785287633</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78528-763-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178528763X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78528-763-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785281518</subfield><subfield code="9">978-1-78528-151-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047693150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047693150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781785281518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047693150</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marak, Victor</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows Malware analysis essentials</subfield><subfield code="b">master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set</subfield><subfield code="c">Victor Marak</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t...</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virus informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781785281518</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781785281518</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781785281518/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047693150
illustrated Illustrated
indexdate 2024-12-18T08:47:37Z
institution BVB
isbn 9781785287633
178528763X
9781785281518
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Packt Publishing
record_format marc
series2 Professional expertise distilled
spelling Marak, Victor VerfasserIn aut
Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
Birmingham, UK Packt Publishing [2015]
©2015
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Professional expertise distilled
Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015)
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t...
Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Logiciels malveillants
Virus informatiques
Sécurité informatique
COMPUTERS ; Security ; Viruses
9781785281518
Erscheint auch als Druck-Ausgabe 9781785281518
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781785281518/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Marak, Victor
Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Logiciels malveillants
Virus informatiques
Sécurité informatique
COMPUTERS ; Security ; Viruses
title Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
title_alt Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
title_auth Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
title_exact_search Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
title_full Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak
title_fullStr Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak
title_full_unstemmed Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak
title_short Windows Malware analysis essentials
title_sort windows malware analysis essentials master the fundamentals of malware analysis for the windows platform and enhance your anti malware skill set
title_sub master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
topic Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Logiciels malveillants
Virus informatiques
Sécurité informatique
COMPUTERS ; Security ; Viruses
topic_facet Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Logiciels malveillants
Virus informatiques
Sécurité informatique
COMPUTERS ; Security ; Viruses
url https://learning.oreilly.com/library/view/-/9781785281518/?ar
work_keys_str_mv AT marakvictor windowsmalwareanalysisessentialsmasterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset
AT marakvictor masterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset