Search Results - "malware"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Malware forensics : investigating and analyzing malicious code by Aquilina, James M., Casey, Eoghan, Malin, Cameron H.

    Published 2008
    Table of Contents: “…1. Malware incident response: volatile data collection and examination on a live windows system -- 2. …”
  2. 2

    Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions by Davis, M. A. [ (Michael A.)], Bodmer, Sean, LeMasters, Aaron

    Published 2010
    “…Hacking exposed malware and rootkits…”
    McGraw Hill
  3. 3

    Malware Analyst's cookbook and dvd : tools and techniques for fighting malicious code by Ligh, Michael W., Ligh, Michael Hale

    Published 2011
    Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.…”
  4. 4

    Virtual honeypots : from botnet tracking to intrusion detection by Provos, Niels, Holz, Thorsten

    Published 2008
    Table of Contents: “…Tracking botnets -- 12. Analyzing malware with CWsandbox…”
  5. 5

    Gray hat hacking : the ethical hacker's handbook by Harper, Allen

    Published 2011
    Table of Contents: “…Vulnerability analysis -- 5. Malware analysis…”
    McGraw Hill
  6. 6

    Unix and Linux forensic analysis DVD toolkit by Pogue, Chris, Altheide, Cory, Haverkos, Todd

    Published 2008
    Table of Contents: “…The /Proc file systems -- 7. File analysis -- 8. Malware…”
  7. 7

    Linux server security : hack and defend by Binnie, Christopher

    Published 2016
    Table of Contents: “…Nmap's prodigious NSE -- 8. Malware detection -- 9. Password cracking with hashcat -- 10. …”
  8. 8

    Computer security fundamentals by Easttom, Chuck

    Published 2012
    Table of Contents: “…Denial of service attacks -- 5. Malware -- 6. Techniques used by hackers -- 7. Industrial espionage in cyberspace -- 8. …”
  9. 9

    Computer security fundamentals by Easttom, Chuck

    Published 2006
    Table of Contents: “…Denial of service attacks -- 5. Malware -- 6. Basics of assessing and securing a system -- 7. …”
  10. 10

    Network security fundamentals : project manual by Reese, Rachelle, Cole, Eric

    Published 2007
    Table of Contents: “…Server roles and security -- 9. Protecting againts malware -- 10. Ongoing security management -- 11. …”
  11. 11

    Information security : principles and practice by Stamp, Mark

    Published 2011
    Table of Contents: “…Real-world security protocols -- 11. Software flaws and malware -- 12. Insecurity in software -- 13. Operating systems and security…”
  12. 12

    Network forensics : tracking hackers through cyberspace by Davidoff, Sherri, Ham, Jonathan

    Published 2012
    Table of Contents: “…Network tunneling -- 12. Malware forensics…”
  13. 13

    Microsoft Windows security : essentials by Gibson, Darril

    Published 2011
    Table of Contents: “…Understanding core security principles -- 2. Understanding malware and social engineering -- 3. Understanding user authentication -- 4. …”
  14. 14

    CompTIA security + guide to network security fundamentals by Ciampa, Mark

    Table of Contents: “…Introduction to security -- 2. Malware and social engineering attacks -- Part 2: Cryptography -- 3. …”
  15. 15

    Information security : foundations, technology and applications by Ali Ismail Awad

    Published 2018
    Table of Contents: “…Cybersecurity: timeline malware analysis and classification -- 11. Recent trends in the cryptanalysis of block ciphers -- 12. …”
  16. 16

    Computational intelligence for privacy and security by Elizondo, David A., Marti´nez-Balleste´, Antoni, Solanas, Agusti

    Published 2012
    Table of Contents: “…Computational intelligent techniques and similarity measures for malware classification -- Intelligence techniques in computer security and forensics: at the boundaries of ethics and law…”
  17. 17

    Computer and cyber security : principles, algorithm, applications, and perspectives

    Table of Contents: “…Medical image enhancement techniques: a survey -- 13. Extraction of malware IOCs and TTPs mapping with coAs -- 14. Implementing a secure web-based application using microsoft SDL -- 15. …”
  18. 18

    Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS by Macaulay, Tyson, Singer, Bryan

    Published 2012