Windows malware analysis essentials : master the fundamentals of malware analysis for the windows platform and enhance your anti-malware skill set (Record no. 11151)

MARC details
000 -LEADER
fixed length control field 03256nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240402171952.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240320b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781785281518
Printed Price Rs. 2536.776
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 005.8
Item number MAR
100 ## - FIRST AUTHOR (IF A PERSON)
9 (RLIN) 4912
Name of author Marak, Victor
245 ## - TITLE STATEMENT
Title Windows malware analysis essentials : master the fundamentals of malware analysis for the windows platform and enhance your anti-malware skill set
Statement of responsibility Marak, Victor
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. UK,
Name of publisher, distributor, etc. Packt Publishing,
Date of publication, distribution, etc. 2015
300 ## - PHYSICAL DESCRIPTION
No. of pages 307p.
520 ## - SUMMARY, ETC.
Summary, etc. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes. Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get t..
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 1346
Subject heading Computer security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 8950
Subject heading Logiciels malveillants
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 8948
Subject heading Sécurité informatique
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 8951
Subject heading Virus informatiques
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Purchase price (after disc. etc) Total Checkouts Full call number Accession No Date last seen Item MRP (printed price) Price effective from Koha item type Date last checked out Total Renewals
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 20/03/2024 2536.78   005.8 MAR 13564 20/03/2024 3499.00 20/03/2024 Books    
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 20/03/2024 2536.78 1 005.8 MAR 13565 24/06/2024 3499.00 20/03/2024 Books 08/06/2024  
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 20/03/2024 2536.78 1 005.8 MAR 13566 29/08/2024 3499.00 20/03/2024 Books 21/06/2024 2
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 20/03/2024 2536.78   005.8 MAR 13567 20/03/2024 3499.00 20/03/2024 Books    
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 20/03/2024 2536.78   005.8 MAR 13568 20/03/2024 3499.00 20/03/2024 Books    
© 2024 Rashtriya Raksha University, All Rights Reserved.