Normal view MARC view ISBD view

Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code / Michael Hale Ligh ... [et al.]

Contributor(s): Ligh, Michael Hale.
Publisher: Indianapolis, IN : Wiley Pub., c2011Description: xxvi, 716 p. : ill. ; 24 cm. + 1 DVD-ROM (4 3/4 in.).ISBN: 9780470613030 (pbk.); 0470613033 (pbk.); 9781118003367 (ebk.); 9781118008294 (ebk.); 9781118008300 (ebk.).Other title: Tools and techniques for fighting malicious code.Subject(s): Malware (Computer software) | Computer securityDDC classification: 005.8
Contents:
Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry
Item type Current location Shelf location Call number Vol info Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU

Floor 3, Shelf 1 , Side 1, TierNo 5, BayNo 7

005.8 MAL 2011 (Browse shelf) Available SOCIT,15009,03,CL 5000116240
Accompanying Material (Media Resource) Taylor's Library-TU
005.8 MAL 2011 (Browse shelf) DVD-ROM 1 Available SOCIT,15009,03,GR 1000525564

Includes index.

"This companion DVD contains: evidence files and source code; Windows and Linux tools and original programs in Python, C/C++, and Perl; annotated videos"--Disc label

Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- Documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry