We called this a cookbook because each "recipe" presents both the ingredients and the steps you take resolve a specific problem or research a given threat. On the DVD, you'll find supporting files and original programs that provide additional resources. You'll learn how to analyze malware using tools written by the authors as well as hundreds of other publicly available tools. If your job involves incident response, computer forensics, systems security, or antivirus research, this book will become invaluable to you. Learn to conduct online investigations without revealing your identity; Use honeypots to collect malware being distributed by bots and worms; Analyze JavaScript, PDFs, and Office documents for suspicious content; Build a low-budget malware lab with virtualization or bare bones hardware; Reverse engineer common encoding and encryption algorithms; Set up an advanced memory forensics platform for malware...

Rezensionen ( 0 )
Noch keine Rezensionen vorhanden.
Sie können die Erörterung eröffnen.
Zitate (0)
Sie können als Erste ein Zitat veröffentlichen.