Description: Dive into the fascinating and terrifying world of evasive malware-malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analyzing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive maneuvers that malware programs use to determine whether they're being analyzed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defense bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn- Modern evasive malware threats Anti-analysis techniques used in malware How malware bypasses and circumvents security controls How malware uses victim targeting and profiling techniques How malware uses anti-forensics and file-less techniques How to perform malware analysis and reverse engineering on evasive programs Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. Dive into the fascinating and terrifying world of evasive malware-malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analyzing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive maneuvers that malware programs use to determine whether they're being analyzed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defense bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn- Modern evasive malware threats Anti-analysis techniques used in malware How malware bypasses and circumvents security controls How malware uses victim targeting and profiling techniques How malware uses anti-forensics and file-less techniques How to perform malware analysis and reverse engineering on evasive programs
Price: 54.15 USD
Location: East Hanover, NJ
End Time: 2024-11-12T10:03:15.000Z
Shipping Cost: 0 USD
Product Images
Item Specifics
Return shipping will be paid by: Buyer
All returns accepted: Returns Accepted
Item must be returned within: 60 Days
Refund will be given as: Money back or replacement (buyer's choice)
Return policy details:
EAN: 9781718503267
UPC: 9781718503267
ISBN: 9781718503267
MPN: N/A
Book Title: Evasive Malware: A Field Guide to Detecting, Analy
Number of Pages: 488 Pages
Publication Name: Evasive Malware : a Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Language: English
Publisher: No Starch Press, Incorporated
Item Height: 1.1 in
Publication Year: 2024
Subject: Security / Viruses & Malware, General, Security / Networking
Item Weight: 32.5 Oz
Type: Textbook
Item Length: 9.1 in
Subject Area: Mathematics, Computers
Author: Kyle Cucci
Item Width: 7.1 in
Format: Trade Paperback