undrgrnd Cliquez ici Baby KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Cliquez ici Acheter Fire Shop Kindle cliquez_ici Jeux Vidéo Gifts
Malware Analyst's Cookbook et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 4 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Malware Analyst's Cookboo... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Nearfine
État: D'occasion: Bon
Commentaire: Peut contenir des notes ou être un ancien livre de bibliothèque. Livraison prévue entre 2 et 3 semaines.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Anglais) Broché – 27 octobre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 59,88
EUR 39,23 EUR 34,33

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Produits fréquemment achetés ensemble

  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • +
  • Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software
  • +
  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Prix total: EUR 168,49
Acheter les articles sélectionnés ensemble

Descriptions du produit

Présentation de l'éditeur

A computer forensics "how–to" for fighting malicious code andanalyzing incidents

With our ever–increasing reliance on computers comes anever–growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyware, rootkits, adware, and other invasivesoftware. Written by well–known malware experts, this guide revealssolutions to numerous problems and includes a DVD of customprograms and tools that illustrate the concepts, enhancing yourskills.

  • Security professionals face a constant battle against malicioussoftware; this practical manual will improve your analyticalcapabilities and provide dozens of valuable and innovativesolutions
  • Covers classifying malware, packing and unpacking, dynamicmalware analysis, decoding and decrypting, rootkit detection,memory forensics, open source malware research, and much more
  • Includes generous amounts of source code in C, Python, and Perlto extend your favorite tools or build new ones, and customprograms on the DVD to demonstrate the solutions

Malware Analyst′s Cookbook is indispensible to ITsecurity administrators, incident responders, forensic analysts,and malware researchers.

Quatrième de couverture

Powerful, step–by–step solutions to dozens of common threats

We called this a cookbook because each "recipe" presents boththe ingredients and the steps you take to resolve a specificproblem or research a given threat. On the DVD, you′ll findsupporting files and original programs that provide additionalresources. You′ll learn how to analyze malware using tools writtenby the authors as well as hundreds of other publicly availabletools. If your job involves incident response, computer forensics,systems security, or antivirus research, this book will becomeinvaluable to you.

  • Learn to conduct online investigations without revealing youridentity

  • Use honeypots to collect malware being distributed by bots andworms

  • Analyze JavaScript, PDFs, and Office documents for suspiciouscontent

  • Build a low–budget malware lab with virtualization or bare boneshardware

  • Reverse engineer common encoding and encryption algorithms

  • Set up an advanced memory forensics platform for malwareanalysis

  • Investigate prevalent threats such as Zeus, Silent Banker,CoreFlood, Conficker, Virut, Clampi, Bankpatch, BlackEnergy, andmany more!

On the DVD

Use the files on the DVD to follow along with the recipes or toconduct your own investigations and analyses. You will find:

  • Evidence files

  • Annotated videos

  • Source code

  • Windows and Linux tools

  • Over 50 original programs in Python, C/C++, and Perl

"The most useful technical security book I′ve read this year. Amust–have for all who protect systems from malicioussoftware."
Lenny Zeltser, Security Practice Director at Savvisand Senior Faculty Member at SANS Institute

"The ultimate guide for anyone interested in malwareanalysis."
Ryan Olson, Director, VeriSign iDefense RapidResponse Team

"Every page is filled with practical malware knowledge,innovative ideas, and useful tools. Worth its weight ingold!"
AAron Walters, Lead Developer of Volatility and VP ofSecurity R&D at Terremark

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 42 commentaires
88 internautes sur 89 ont trouvé ce commentaire utile 
Current Best of Breed for Technical Malware Books 30 octobre 2010
Par D. Craig - Publié sur Amazon.com
Format: Broché Achat vérifié
I have just received this book and have not yet worked my way through all the chapters, but I have reviewed the contents and tool DVD. I teach college classes on Network and Computer forensics from a survey level through a hard-core programming level. I have likely purchased or been sent most of the books in this area, and this book does stand out for the following reasons.

1. The material is up-to-date. Tools and malware resources change on an almost daily basis and you need to get books that reflect current resources and best practices. This book does a very good job covering the current tools and resources. It provides the web addresses for the various tools and resources discussed in each chapter. It also refers to current research, articles, and conference material in the areas covered in the chapters.

2. The topics covered are comprehensive. The book includes topics on anonymizing (the first chapter), classifying malware, shellcode, DLL code injection, debugging, how to safely run malware in a virtual environment, dumping memory and memory forensics, debugging kernel code, etc. The topics are collected into 18 chapters and are very complete.

3. The focus of this book is performing analysis of malware (which includes a wide variety of exploit types) and creating/using the tools to perform this analysis. Numerous examples are given showing how the analysis can be done, and some background information is presented as needed.

4. The book assumes the reader has brains. Too many "Computer Forensics" books are a waste of time for someone that already has a background in programming, networking, etc. They (the other Forensics books) often start their discussion of Network Forensics with a definition of what a network is ("A network sends packets between computers..."). Give me a break. This book assumes the reader already has a level of knowledge that is appropriate to anyone really working in this field. However, the authors do a good job explaining what needs to be explained in the course of presenting the topics. They don't talk down to the reader.

5. The book has a wealth of examples. Each chapter presents the topics by showing examples as well as showing how to get and install the necessary tools.

6. The book balances using pre-written tools with create-your-own tools. The latter include scripts in Python and programs in C/C++. The authors indicate where to get various relevant libraries which can be used to create or customize tools. This book is not just a collection of tools, but shows how to use the tools, analysis techniques, etc.

7. The book is very reasonably priced for the quality of content and the extra DVD. The price from Amazon is under $40 and the retail price is about $60. However, even at $60 this book is a bargain. Even if you just used the web addresses for the lists of tools presented in each chapter, the amount of time would take to locate and document the huge number of forensics/hacking tools presented in this book, is worth more than the book's price.

8. The book presents a huge amount of material. Almost every page is crammed with information and examples. Frankly, this book presents more information in one chapter than most other books do in their entirety, and this book has 18 chapters. The chapters are written so they are independent of each other and you can select the chapter you want to work through without reading previous chapters.

9. The tool focus is open-source and platform independent. The authors stay with open-source tools and try to reference tools that can run on both Linux and Windows. However, they also use the best tools available for a specific task, even if the tool only runs under Linux or only under Windows.

Reader Background:
There are enough varied topics in this book that readers with different levels of knowledge can benefit. The authors assume the reader has a background in basic networking, understands operating systems (both Windows and Unix), understands programming (Python, C/C++, Assembly), and understand processor basics (registers, the stack, etc). However, these assumptions are not barriers to getting something out of this book. Beginners will find the book too difficult, but would profit by just downloading the various tools referenced in the chapters.

Bottom line:
* If you are doing forensic analysis on Malware you should purchase this book (for the chapters on debugging, memory forensics, and malware forensics)
* If you are working in the network/computer security area you should purchase this book (for the chapters on setting up a malware lab, classifying malware, and setting up a malware sandbox)
* If you are interested in the programming aspects of malware you should purchase this book (for the chapters on DLLs and debugging malware code and on code injection)
* If (and I hesitate to include this) you want to be a hacker you should purchase this book and read the entire thing.
31 internautes sur 32 ont trouvé ce commentaire utile 
If you need some practical tips for working with malware this is your cookbook! 12 novembre 2010
Par David Nardoni, EnCE, GCIH, CISSP - Publié sur Amazon.com
Format: Broché Achat vérifié
The Malware Analyst's Cookbook is the best book I have read when it comes to practical techniques for working with malware. This book give many practical examples to helping forensic examiners, incident responders, malware analysts or others on how to deal with malware. This book touches so many great areas when it comes to malware analysis it is hard to focus on highlighting them all.

One suggestion for those looking to purchase this book, it would help you to gain a mild understanding of python as many of the very great tools contained within the book rely on python. It is by no means necessary to understand python to use the tools but it would be helpful to better understand what the tools are doing.

I found the 4 chapters on memory analysis to be completely awesome! I have not seen such a wealth of information on memory analysis in once place. The chapters on memory analysis go from the basic analysis of memory dump to exploring code injection and rootkits to pulling registry and network artifacts from memory.

The book does a great job of introducing the reader to multiple ways in dealing with malware from using tools for classification, scanning with AV engines and sandboxes to working with DLLs and malware debugging. I really liked how when a tool is introduced then authors then usually have a script to automate much of the process. The DVD that comes with the book is worth the price of the book just by itself.

If you work with malware in any capacity I think this book with benefit you as it has so much to offer in so many areas when it comes to fighting malicious code.
9 internautes sur 9 ont trouvé ce commentaire utile 
Excellent Guide To Help Apply Your Knowledge 6 décembre 2010
Par Russell D. Holloway - Publié sur Amazon.com
Format: Broché Achat vérifié
Still working my way through this book, but so far every chapter has been quite useful. This book is more of a practical guide to malware analysis than anything else. I have found that many of the previous books are in one of two cases: they either are not quite practical enough and simply teach the concepts without showing you how to use the programs (or often even mentioning the programs), or they are too difficult for those who want to learn more about the subject but haven't been doing it for years.

I understand that the concepts are key in the long run, and mentioning specific programs can lead to an outdated book faster, but considering this book just came out, the programs are indeed current and work great. The book goes through a good number of programs freely available on the web or included on dvd, and it describes them and how to use them / configure them as well, rather than simply presenting a list of programs.

The book is detailed and in-depth enough to provide good analysis of malware as well. It does assume some prior knowledge of programming, general security concepts, and different OS's, but it provides clear descriptions of malware analysis tools that are easy to follow.

Overall, it's a good book to pick up and work your way through, rather than read your way through. This is simply the way it's structured. As you read each chapter you feel the need to actually sit in front of a computer and FOLLOW the recipes to learn the material - something that can often be difficult to do with other textbooks. So far, my favorite book on the subject!
19 internautes sur 22 ont trouvé ce commentaire utile 
Buy this book! Read this book! 14 novembre 2010
Par A. Student - Publié sur Amazon.com
Format: Broché
Malware is a highly prevalent threat and the techniques for studying it have tended to be obscure and rather difficult to ferret out. This book brings the techniques into the light and diligent study will add many useful tactics to your repetoire. The book is organized into "recipes" that are grouped into 18 chapters. Each recipe covers how to perform a particular "thing" clearly with illustrations, code/output samples and references for more detail. The tools DVD is organized into chapters matching the text and individual recipes refer you to the matching tool on the DVD.

It is a technical book so be warned that its benefits will be reaped only by dilignet study and working through the recipes.

Highly recommended for people enganged in or interested in malware analysis or even the more general topics of how malware operates. The script for automating analysis of suspect malware by multiple antivirus scanners from the command line (Chapter 4) are worth the price of the book alone.
7 internautes sur 7 ont trouvé ce commentaire utile 
There's a recipe for that! 11 décembre 2010
Par Dustin Schultz - Publié sur Amazon.com
Format: Broché
This is an excellent book on the topic of malware analysis. The book is loaded with content at close to 700 pages. There's a recipe for everything! Everything from how to setup a malware lab to how to perform memory forensics on a rootkit.

The book is suitable for all levels of anyone interested in security and malware analysis. The recipe style of the book makes it easy to quickly jump to a section you are interested in or need at that moment or it can be used to skip sections you're not interested in without losing anything.

The provided DVD is actually useful. It provides a number of custom written Python scripts that the authors took consider time to write. You can easily add these to your malware analysis toolkit for easier malware analysis and increased productivity.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?