Malware Analysis: Techniques and Tools for Detection and Neutralization
Exploring Detection, Containment, and Response Techniques in Defending Against Digital Threats
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Obtén 3 meses por US$0.99 al mes
Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Compra ahora por $4.99
-
Narrado por:
-
Virtual Voice
Este título utiliza narración de voz virtual
This book is a comprehensive, practical guide to understanding, dissecting, and combating modern malware. It introduces readers to the foundations of malware analysis, explaining how malicious software evolves, spreads, and exploits digital systems.
Across its chapters, the book explores the major types of malware, their behaviors, and the growing sophistication of cyber-attacks in today’s interconnected world. It presents essential methodologies—static, dynamic, and behavioral analysis—showing how each contributes to uncovering a threat’s purpose, structure, and impact.
Readers learn core reverse-engineering techniques using industry-standard tools such as IDA Pro, Ghidra, OllyDbg, Radare2, and x64dbg. The book explains how to disassemble and debug malicious executables, detect evasion strategies, extract hidden strings, analyze PE headers, identify malicious imports and libraries, and understand the logic and flow that underpin an attack.
Through real-world examples—including ransomware families, Trojans, worms, and advanced persistent threats—the book demonstrates how attackers obfuscate code, leverage vulnerabilities, and maintain persistence. It also details how analysts can create countermeasures, generate detection signatures, improve incident response, and fortify defenses.
Clear, structured, and geared toward cybersecurity students and professionals, this book provides the analytical mindset and technical skills needed to detect, contain, and neutralize digital threats in an evolving cybersecurity landscape.