Home
»
Evasive Malware
A01=Kyle Cucci
Age Group_Uncategorized
Age Group_Uncategorized
Antivirus Bypass Techniques
Author_Kyle Cucci
automatic-update
bugs
business
Category1=Non-Fiction
Category=URJ
Category=URY
cloud computing
computer
computer books
computer networking
computer networks
computer science
computer security
computers
COP=United States
cryptography
cyber
cyber defense
cyber security
cyber security book
cyber security books
cybersecurity
cybersecurity book
data
Delivery_Pre-order
education
engineering
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
evasive malware
hackers
hacking
hacking book
hacking books
how to
internet
Language_English
law
Learning Malware Analysis
linux
malware
malware analysis
Mastering Malware Analysis
math
network
network security
networking
PA=Not yet available
penetration test
penetration testing
Practical Malware Analysis
Price_€50 to €100
privacy
problem solving
programming
PS=Forthcoming
psychology
reference
security
security analysis
security analysis book
self help
softlaunch
tech
technology
threat detection
warfare
work
Product details
- ISBN 9781718503267
- Dimensions: 177 x 234mm
- Publication Date: 10 Sep 2024
- Publisher: No Starch Press,US
- Publication City/Country: US
- Product Form: Paperback
- Language: English
Delivery/Collection within 10-20 working days
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.
Kyle Cucci has over 17 years in cybersecurity and IT, including roles as a malware analyst and detection engineer with Proofpoint’s Threat Research team and leader of the forensic investigations and malware research teams at Deutsche Bank. Cucci regularly speaks at security conferences and has led international trainings and workshops on topics such as malware analysis and security engineering. In his free time, Cucci enjoys contributing to the community via open source tooling, research, and blogging.
Qty:
