Computers & Internet Books:

Evasive Malware

Understanding Deceptive and Self-Defending Threats
Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Paperback / softback
$145.99
Releases

Pre-order to reserve stock from our first shipment. Your credit card will not be charged until your order is ready to ship.

Available for pre-order now

Buy Now, Pay Later with:

4 payments of $36.50 with Afterpay Learn more

Pre-order Price Guarantee

If you pre-order an item and the price drops before the release date, you'll pay the lowest price. This happens automatically when you pre-order and pay by credit card.

If paying by PayPal, Afterpay, Zip or internet banking, and the price drops after you have paid, you can ask for the difference to be refunded.

If Mighty Ape's price changes before release, you'll pay the lowest price.

Availability

This product will be released on

Delivering to:

It should arrive:

  • 17-24 September using International Courier

Description

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. Dive into the fascinating and terrifying world of evasive malware-malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive maneuvers that malware programs use to determine whether they're being analyzed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defense bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn- Modern evasive malware threats Anti-analysis techniques used in malware How malware bypasses and circumvents security controls How malware uses victim targeting and profiling techniques How malware uses anti-forensics and file-less techniques How to perform malware analysis and reverse engineering on evasive programs

Author Biography:

Kyle Cucci leads the threat analysis and forensics team at a large global financial institution, where he focuses on investigating and hunting the latest cybercrime and malware threats. He has over 15 years of experience in IT, serving various roles in malware research, threat intelligence, incident response, penetration testing, automotive security, and network administration. Kyle takes every opportunity to speak at security conferences and meet-up groups and has led international workshops in malware analysis, penetration testing, and security engineering. When not researching the latest threats, Kyle can be spotted in the wild spending time with his wife and sons or enjoying a good craft beer.
Release date Australia
September 10th, 2024
Author
Pages
500
Audience
  • Professional & Vocational
ISBN-13
9781718503267
Product ID
36841946

Customer previews

Nobody has previewed this product yet. You could be the first!

Write a Preview

Help & options

Filed under...