-
Mastering Malware Analysis - Second Edition
Author Alexey Kleymenov , Amr Thabet
Learn effective malware analysis tactics to prevent your systems from getting infectedKey FeaturesInvestigate cyberattacks and prevent malware-related incidents from occurring in the futureLearn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much moreGet prac....
Release Date 2022/09 -
Author Abhijit Mohanta , Anoop Saldanha
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engi....
Release Date 2020/09 -
Author Chris Eagle , Kara Nance
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the wo....
Release Date 2020/08 -
Author Matthew Berninger , Ric Messier
There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
Release Date 2019/10 -
Author Alexey Kleymenov , Amr Thabet
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A pract....
Release Date 2019/06 -
Author Hillary Sanders , Joshua Saxe
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, ....
Release Date 2018/09 -
Author Monnappa K A
Understand malware analysis and its practical implementationAbout This BookExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactic....
Release Date 2018/06 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Big Data Analytics with Applications in Insider Threat Detection
Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
Release Date 2017/11 -
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew Bettany
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03 -
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Author Aaron LeMasters , Sean M. Bodmer , Michael A. Davis , Christopher C. Elisan
Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootki....
Release Date 2016/12 -
Author Timothy Gallo , Allan Liska
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
Release Date 2016/12 -
Author Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
Release Date 2015/09 -
Windows Malware Analysis Essentials
Author Victor Marak
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand ....
Release Date 2015/09 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
The 2011 Fukushima Nuclear Power Plant Accident
Author Kenji Iino , Naoto Kasahara , Masao Fuchigami , Seiji Abe , Yotaro Hatamura
In March 2011 the Fukushima nuclear power plant (NPP) in Japan was hit by an earthquake and subsequent tsunami which resulted in the release of significant amounts of radioactive material. The incident led to the suspension of nuclear programmes by a number of count....
Release Date 2014/11 -
Detecting and Combating Malicious Email
Author Cade Kamachi , Julie JCH Ryan
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully au....
Release Date 2014/10 -
Author Tim Strazzere , Jose Andre Morales , Manu Quintans , Shane Hartman , Ken Dunham
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach t....
Release Date 2014/10 -
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Author Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacksMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malwa....
Release Date 2014/07 -
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
Author Jean Claude Larreche
One of the most frequent challenges that managers and executives face today is: ‘How do I keep on growing and at the same time, make a profit?’ Based on the author’s extensive research on over 350 Fortune 1000 Firms, The Momentum Effect proves that the old method of....
Release Date 2013/09 -
Author Douglas Spotted Eagle
Carefully detailed screen shots and step-by-step directions illustrate how to use Encore DVD software in a time-efficient way. Readers learn to harness the full scope of Encore DVD's functions, including importing and organizing content to build the DVD, using....
Release Date 2013/04 -
The Snowball Effect: Communication Techniques to Make You Unstoppable
Author Andy Bounds
The long-awaited follow-up to the international bestseller The Jelly EffectCommunication is supposed to cause something. That's the point of it. So, what do you want to achieve following your communication? Do you want someone to answer 'yes'? Do you want to impr....
Release Date 2013/03 -
Author Andrew Honig , Michael Sikorski
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
Release Date 2012/02 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
The Jelly Effect: How to make your communication stick
Author Andy Bounds
Like throwing jelly at a wall, poor communication never sticks.Too much information and not enough relevance is a problem that pervades almost all business communication. So what's the answer? More relevance and a lot less jelly.The Jelly Effect teaches you simple,....
Release Date 2010/09 -
Author Mike Dulworth , Michael Dulworth
Networking is a critically important skill, but few people are aware of its power or know how to develop, maintain, and leverage networks over their lifetime. In The Connect Effect, Michael Dulworth reveals the surprising ways personal, professional, and virtua....
Release Date 2008/01 -
Home Network Security Simplified
Author Nathan Clement , Neil Anderson , Jim Doherty
A straightforward, graphic-based reference for securing your home network Set up a firewallSecure your wireless networkStop adware and spywareKeep your children safe from online threatsPrevent a virus outbreakAvoid Internet scams Phishing. Malware. Spyware. Trojan h....
Release Date 2006/07 -
Malicious Cryptography: Exposing Cryptovirology
Author Moti Yung , Adam Young
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subver....
Release Date 2004/02