Malware Analysis: Techniques and Tools for Detection and Neutralization Audiolibro Por Raul Renales Aguero arte de portada

Malware Analysis: Techniques and Tools for Detection and Neutralization

Exploring Detection, Containment, and Response Techniques in Defending Against Digital Threats

Muestra de Voz Virtual
Prueba por $0.00
Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Acceso ilimitado a nuestro catálogo de más de 150,000 audiolibros y podcasts.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.

Malware Analysis: Techniques and Tools for Detection and Neutralization

De: Raul Renales Aguero
Narrado por: Virtual Voice
Prueba por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $4.99

Compra ahora por $4.99

Background images

Este título utiliza narración de voz virtual

Voz Virtual es una narración generada por computadora para audiolibros..

This book is a comprehensive, practical guide to understanding, dissecting, and combating modern malware. It introduces readers to the foundations of malware analysis, explaining how malicious software evolves, spreads, and exploits digital systems.

Across its chapters, the book explores the major types of malware, their behaviors, and the growing sophistication of cyber-attacks in today’s interconnected world. It presents essential methodologies—static, dynamic, and behavioral analysis—showing how each contributes to uncovering a threat’s purpose, structure, and impact.

Readers learn core reverse-engineering techniques using industry-standard tools such as IDA Pro, Ghidra, OllyDbg, Radare2, and x64dbg. The book explains how to disassemble and debug malicious executables, detect evasion strategies, extract hidden strings, analyze PE headers, identify malicious imports and libraries, and understand the logic and flow that underpin an attack.

Through real-world examples—including ransomware families, Trojans, worms, and advanced persistent threats—the book demonstrates how attackers obfuscate code, leverage vulnerabilities, and maintain persistence. It also details how analysts can create countermeasures, generate detection signatures, improve incident response, and fortify defenses.

Clear, structured, and geared toward cybersecurity students and professionals, this book provides the analytical mindset and technical skills needed to detect, contain, and neutralize digital threats in an evolving cybersecurity landscape.

Seguridad y Cifrado Seguridad para computadora Ciberseguridad Para reflexionar Hackeo Tecnología Software
Todavía no hay opiniones