Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows Malware / Monnappa K. A
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Main | National University - Manila | Digital Forensic | General Circulation | GC QA 76.76.C68 .K3l 2018 c.1 (Browse shelf (Opens below)) | c.1 | Available | NULIB000017987 | |
![]() |
LRC - Main | National University - Manila | Gen. Ed. - CCIT | General Circulation | GC QA 76.76.C68 .K3l 2018 c.2 (Browse shelf (Opens below)) | c.2 | Available | NULIB000018822 |
Browsing National University - Manila shelves, Shelving location: General Circulation, Collection: Gen. Ed. - CCIT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.76 .S64 2016 Software quality assurance : in large scale and complex software-intensive systems / | GC QA 76.76.A65 .K56 2012 Android apps with app inventor : the fast and easy way to build android apps / | GC QA 76.76.A65 .M67 2020 Jakarta EE cookbook / | GC QA 76.76.C68 .K3l 2018 c.2 Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows Malware / | GC QA 76.76.C68 .K58 2019 c.2 Mastering malware analysis : the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks / | GC QA 76.76. H37 2014 Guide to advanced software testing / | GC QA 76.76.J38 .M35 2012 c.3 Java programming : from problem analysis to program design / |
Includes index.
Introduction to Malware Analysis -- Static Analysis -- Dynamic Analysis -- Assembly Language and Disassembly Primer -- Disassembly Using IDA-- Debugging Malicious Binaries -- Malware Functionalities and Persistence -- Code Injection and Hooking -- Malware Obfuscation Techniques -- Hunting Malware Using Memory Forensics -- Detecting Advanced Malware Using Memory Forensics.
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.
This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.
This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.
There are no comments on this title.