62 products were found matching your search for Malware in 3 shops:
-
Malware Forensics: Investigating and Analyzing Malicious Code
Vendor: Abebooks.com Price: 62.47 $New Book. Shipped from UK. Established seller since 2000.
-
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Vendor: Abebooks.com Price: 58.42 $Book is in NEW condition. 1.84
-
Malware Analyst?s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code Format: Paperback
Vendor: Abebooks.com Price: 54.49 $A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
-
Malware Data Science : Attack Detection and Attribution
Vendor: Abebooks.com Price: 40.36 $Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis. You'll learn how to:- Analyze malware using static analysis- Observe malware behavior using dynamic analysis- Identify adversary groups through shared code analysis- Catch 0-day vulnerabilities by building your own machine learning detector- Measure malware detector accuracy- Identify malware campaigns, trends, and relationships through data visualization Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.
-
Malware Analysis Techniques: Tricks for the triage of adversarial software
Vendor: Abebooks.com Price: 38.19 $Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
-
Malware Science
Vendor: Abebooks.com Price: 51.73 $New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000
-
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Vendor: Abebooks.com Price: 5.55 $Book is in Used-Good condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain limited notes and highlighting. 1.84
-
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
Vendor: Abebooks.com Price: 37.69 $The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
-
Malware Forensics Field Guide for Windows Systems [first edition]
Vendor: Abebooks.com Price: 36.17 $Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.A condensed hand-held guide complete with on-the-job tasks and checklistsSpecific for Windows-based systems, the largest running OS in the worldAuthors are world-renowned leaders in investigating and analyzing malicious code
-
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Vendor: Abebooks.com Price: 22.58 $Used book in good and clean conditions. Pages and cover are intact. Limited notes marks and highlighting may be present. May show signs of normal shelf wear and bends on edges. Item may be missing CDs or access codes. May include library marks. Fast Shipping
-
Android Malware Detection With Machine Learning : Detection and Analysis by Human and Machine
Vendor: Abebooks.com Price: 34.27 $Unread book in perfect condition.
-
Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software
Vendor: Abebooks.com Price: 40.16 $Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit codeHands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
-
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
Vendor: Abebooks.com Price: 59.12 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 2.65
-
Evasive Malware : Understanding Deceptive and Self-defending Threats
Vendor: Abebooks.com Price: 62.98 $Unread book in perfect condition.
-
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Vendor: Abebooks.com Price: 21.15 $Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit codeHands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
-
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Vendor: Abebooks.com Price: 56.11 $Book is in NEW condition. 2.16
-
Android Malware Detection using Machine Learning. Data-Driven Fingerprinting and Threat Intelligence.
Vendor: Abebooks.com Price: 20.26 $XIV, 202 p. Hardcover. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Advances in Information Security, 86. Sprache: Englisch.
-
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization
Vendor: Abebooks.com Price: 34.00 $Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
-
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions (Paperback or Softback)
Vendor: Abebooks.com Price: 52.96 $Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.· Learn how malware infects, survives, and propagates across an enterprise· See how hackers develop malicious code and target vulnerable systems· Detect, neutralize, and remove user-mode and kernel-mode rootkits · Use hypervisors and honeypots to uncover and kill virtual rootkits· Defend against keylogging, redirect, click fraud, and identity theft· Block spear phishing, client-side, and embedded-code exploits· Effectively deploy the latest antivirus, pop-up blocker, and firewall software· Identify and stop malicious processes using IPS solutions
-
Hacking Exposed: Malware & Rootkits Secrets & Solutions
Vendor: Abebooks.com Price: 47.52 $"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS
62 results in 0.229 seconds
Related search terms
© Copyright 2024 shopping.eu