100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software $32.19   Add to cart

Exam (elaborations)

Practical Malware Analysis_ The Hands-On Guide to Dissecting Malicious Software

 0 view  0 purchase
  • Course
  • Institution

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach y...

[Show more]

Preview 4 out of 1128  pages

  • July 30, 2022
  • 1128
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
, Practical Malware Analysis: The
Hands-On Guide to Dissecting
Malicious Software
Michael Sikorski
Andrew Honig
Editor
Tyler Ortman

Copyright © 2012

PRACTICAL MALWARE ANALYSIS. Copyright © 2012 by Michael Sikorski and Andrew Honig.
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system,
without the prior written permission of the copyright owner and the publisher.
16 15 14 13 12 123456789
ISBN-10: 1-59327-290-1
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Stephen Lawler
Copyeditor: Marilyn Smith
Compositor: Riley Hoffman
Proofreader: Irene Barnard
Indexer: Nancy Guenther
For information on book distributors or translations, please contact No Starch Press, Inc. directly:
Library of Congress Cataloging-in-Publication Data
A catalog record of this book is available from the Library of Congress.
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product
and company names mentioned herein may be the trademarks of their respective owners. Rather than use a
trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial
fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has

,been taken in the preparation of this work, neither the authors nor No Starch Press, Inc. shall have any liability
to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly
by the information contained in it.
No Starch Press

, Praise for Practical Malware
Analysis
“An excellent crash course in malware analysis.”
—Dino Dai Zovi, INDEPENDENT SECURITY CONSULTANT
“. . . the most comprehensive guide to analysis of malware, offering detailed coverage of all the essential
skills required to understand the specific challenges presented by modern malware.”
—Chris Eagle, SENIOR LECTURER OF COMPUTER SCIENCE, NAVAL
POSTGRADUATE SCHOOL
“A hands-on introduction to malware analysis. I’d recommend it to anyone who wants to dissect Windows
malware.”
—Ilfak Guilfanov, CREATOR OF IDA PRO
“. . . a great introduction to malware analysis. All chapters contain detailed technical explanations and hands-
on lab exercises to get you immediate exposure to real malware.”
—Sebastian Porst, GOOGLE SOFTWARE ENGINEER
“. . . brings reverse-engineering to readers of all skill levels. Technically rich and accessible, the labs will lead
you to a deeper understanding of the art and science of reverse-engineering. I strongly recommend this book
for beginners and experts alike.”
—Danny Quist, PHD, FOUNDER OF OFFENSIVE COMPUTING
“If you only read one malware book or are looking to break into the world of malware analysis, this is the
book to get.”
—Patrick Engbretson, IA PROFESSOR, DAKOTA STATE UNIVERSITY AND
AUTHOR OF The Basics of Hacking and Pen Testing
“. . . an excellent addition to the course materials for an advanced graduate level course on Software Security
or Intrusion Detection Systems. The labs are especially useful to students in teaching the methods to reverse-
engineer, analyze, and understand malicious software.”
—Sal Stolfo, PROFESSOR, COLUMBIA UNIVERSITY

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller supportmutiglobeapp. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $32.19. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$32.19
  • (0)
  Add to cart