Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly cod...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
[2015]
|
Schriftenreihe: | Professional expertise distilled
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047693150 | ||
003 | DE-627-1 | ||
005 | 20240228115939.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781785287633 |c electronic bk. |9 978-1-78528-763-3 | ||
020 | |a 178528763X |c electronic bk. |9 1-78528-763-X | ||
020 | |a 9781785281518 |9 978-1-78528-151-8 | ||
035 | |a (DE-627-1)047693150 | ||
035 | |a (DE-599)KEP047693150 | ||
035 | |a (ORHE)9781785281518 | ||
035 | |a (DE-627-1)047693150 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Marak, Victor |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Windows Malware analysis essentials |b master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |c Victor Marak |
246 | 3 | 3 | |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Professional expertise distilled | |
500 | |a Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015) | ||
520 | |a Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... | ||
630 | 2 | 0 | |a Microsoft Windows (Computer file) |
650 | 0 | |a Malware (Computer software) | |
650 | 0 | |a Computer viruses | |
650 | 0 | |a Computer security | |
650 | 4 | |a Microsoft Windows (Computer file) | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Virus informatiques | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Security ; Viruses | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Malware (Computer software) | |
776 | 1 | |z 9781785281518 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781785281518 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781785281518/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047693150 |
---|---|
_version_ | 1818767296148013056 |
adam_text | |
any_adam_object | |
author | Marak, Victor |
author_facet | Marak, Victor |
author_role | aut |
author_sort | Marak, Victor |
author_variant | v m vm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047693150 (DE-599)KEP047693150 (ORHE)9781785281518 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04665cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-047693150</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115939.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785287633</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78528-763-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178528763X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78528-763-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785281518</subfield><subfield code="9">978-1-78528-151-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047693150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047693150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781785281518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047693150</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marak, Victor</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows Malware analysis essentials</subfield><subfield code="b">master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set</subfield><subfield code="c">Victor Marak</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t...</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virus informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781785281518</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781785281518</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781785281518/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047693150 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:37Z |
institution | BVB |
isbn | 9781785287633 178528763X 9781785281518 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
series2 | Professional expertise distilled |
spelling | Marak, Victor VerfasserIn aut Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Birmingham, UK Packt Publishing [2015] ©2015 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Professional expertise distilled Includes index. - Online resource; title from cover page (Safari, viewed September 25, 2015) Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t... Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Logiciels malveillants Virus informatiques Sécurité informatique COMPUTERS ; Security ; Viruses 9781785281518 Erscheint auch als Druck-Ausgabe 9781785281518 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781785281518/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Marak, Victor Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Logiciels malveillants Virus informatiques Sécurité informatique COMPUTERS ; Security ; Viruses |
title | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
title_alt | Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
title_auth | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
title_exact_search | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
title_full | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak |
title_fullStr | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak |
title_full_unstemmed | Windows Malware analysis essentials master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Victor Marak |
title_short | Windows Malware analysis essentials |
title_sort | windows malware analysis essentials master the fundamentals of malware analysis for the windows platform and enhance your anti malware skill set |
title_sub | master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set |
topic | Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Logiciels malveillants Virus informatiques Sécurité informatique COMPUTERS ; Security ; Viruses |
topic_facet | Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Logiciels malveillants Virus informatiques Sécurité informatique COMPUTERS ; Security ; Viruses |
url | https://learning.oreilly.com/library/view/-/9781785281518/?ar |
work_keys_str_mv | AT marakvictor windowsmalwareanalysisessentialsmasterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset AT marakvictor masterthefundamentalsofmalwareanalysisforthewindowsplatformandenhanceyourantimalwareskillset |