没有合适的资源?快使用搜索试试~ 我知道了~
首页恶意代码分析实战 英文原版pdf
恶意代码分析实战 英文原版pdf
需积分: 26 361 浏览量
更新于2023-05-30
评论
收藏 9.27MB PDF 举报
恶意代码分析实战,详细介绍了网络安全基本技术。包括:静态分析、动态分析、反汇编、IDA分析等
资源详情
资源评论
资源推荐


PRAISE FOR PRACTICAL MALWARE ANALYSIS
Digital Forensics Book of the Year, FORENSIC 4CAST AWARDS 2013
“A hands-on introduction to malware analysis. I’d recommend it to anyone
who wants to dissect Windows malware.”
—Ilfak Guilfanov, C
REATOR OF IDA PRO
“The book every malware analyst should keep handy.”
—Richard Bejtlich, CSO
OF MANDIANT & FOUNDER OF TAOSECURITY
“This book does exactly what it promises on the cover; it’s crammed with
detail and has an intensely practical approach, but it’s well organised enough
that you can keep it around as handy reference.”
—Mary Branscombe, ZDN
ET
“If you’re starting out in malware analysis, or if you are are coming to analysis
from another discipline, I’d recommend having a nose.”
—Paul Baccas, N
AKED SECURITY FROM SOPHOS
“An excellent crash course in malware analysis.”
—Dino Dai Zovi, I
NDEPENDENT SECURITY CONSULTANT
“The most comprehensive guide to analysis of malware, offering detailed
coverage of all the essential skills required to understand the specific
challenges presented by modern malware.”
—Chris Eagle, S
ENIOR LECTURER OF COMPUTER SCIENCE AT THE NAVAL
P
OSTGRADUATE SCHOOL
“A great introduction to malware analysis. All chapters contain detailed
technical explanations and hands-on lab exercises to get you immediate
exposure to real malware.”
—Sebastian Porst, G
OOGLE SOFTWARE ENGINEER
“Brings reverse-engineering to readers of all skill levels. Technically rich and
accessible, the labs will lead you to a deeper understanding of the art and
science of reverse-engineering. I strongly believe this will become the defacto
text for learning malware analysis in the future.”
—Danny Quist, P
HD, FOUNDER OF OFFENSIVE COMPUTING

“An awesome book . . . written by knowledgeable authors who possess
the rare gift of being able to communicate their knowledge through the
written word.”
—Richard Austin, IEEE C
IPHER
“If you only read one malware book or are looking to break into the world of
malware analysis, this is the book to get.”
—Patrick Engebretson, IA P
ROFESSOR, DAKOTA STATE UNIVERSITY AND
AUTHOR OF The Basics of Hacking and Pen Testing
“An excellent addition to the course materials for an advanced graduate level
course on Software Security or Intrusion Detection Systems. The labs are
especially useful to students in teaching the methods to reverse-engineer,
analyze, and understand malicious software.”
—Sal Stolfo, P
ROFESSOR, COLUMBIA UNIVERSITY
“The explanation of the tools is clear, the presentation of the process is
lucid, and the actual detective work fascinating. All presented clearly and
hitting just the right level so that developers with no previous experience in
this particular area can participate fully. Highly recommended.”
—Dr. Dobb’s
“This book is like having your very own personal malware analysis teacher
without the expensive training costs.”
—Dustin Schultz, T
HEXPLOIT
“I highly recommend this book to anyone looking to get their feet wet
in malware analysis or just looking for a good desktop reference on the
subject.”
—Pete Arzamendi, 403 L
ABS
“I do not see how anyone who has hands-on responsibility for security of
Windows systems can rationalize not being familiar with these tools.”
—Stephen Northcutt, SANS I
NSTITUTE

PRACTICAL
MALWARE ANALYSIS
The Hands-On Guide to
Dissecting Malicious
Software
by Michael Sikorski and Andrew Honig
San Francisco

PRACTICAL MALWARE ANALYSIS. Copyright © 2012 by Michael Sikorski and Andrew Honig.
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior
written permission of the copyright owner and the publisher.
Fifth printing
16 15 14 5 6 7 8 9
ISBN-10: 1-59327-290-1
ISBN-13: 978-1-59327-290-6
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Stephen Lawler
Copyeditor: Marilyn Smith
Compositor: Riley Hoffman
Proofreader: Irene Barnard
Indexer: Nancy Guenther
For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 415.863.9900; info@nostarch.com; www.nostarch.com
Library of Congress Cataloging-in-Publication Data
Sikorski, Michael.
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski,
Andrew Honig.
p. cm.
ISBN 978-1-59327-290-6 -- ISBN 1-59327-290-1
1. Malware (Computer software) 2. Computer viruses. 3. Debugging in computer science. 4. Computer security.
I. Honig, Andrew. II. Title.
QA76.76.C68S534 2012
005.8'4--dc23
2012000214
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark
symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been
taken in the preparation of this work, neither the authors nor No Starch Press, Inc. shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the
information contained in it.
剩余801页未读,继续阅读



















HeronZhang
- 粉丝: 7
- 资源: 10
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

会员权益专享
最新资源
- ARM Cortex-A(armV7)编程手册V4.0.pdf
- ABB机器人保养总结解析.ppt
- 【超详细图解】菜鸡如何理解双向链表的python代码实现
- 常用网络命令的使用 ipconfig ping ARP FTP Netstat Route Tftp Tracert Telnet nslookup
- 基于单片机控制的DC-DC变换电路
- RS-232接口电路的ESD保护.pdf
- linux下用time(NULL)函数和localtime()获取当前时间的方法
- Openstack用户使用手册.docx
- KUKA KR 30 hA,KR 60 hA机器人产品手册.pdf
- Java programming with JNI
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0