Cargando…
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses...
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
John Wiley & Sons Inc
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412469 |
_version_ | 1780923891983581184 |
---|---|
author | Ligh, Michael Adair, Steven Hartstein, Blake |
author_facet | Ligh, Michael Adair, Steven Hartstein, Blake |
author_sort | Ligh, Michael |
collection | CERN |
description | A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle agains |
id | cern-1412469 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | John Wiley & Sons Inc |
record_format | invenio |
spelling | cern-14124692021-04-22T00:45:12Zhttp://cds.cern.ch/record/1412469engLigh, MichaelAdair, StevenHartstein, BlakeMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious CodeComputing and ComputersA computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle againsJohn Wiley & Sons Incoai:cds.cern.ch:14124692010 |
spellingShingle | Computing and Computers Ligh, Michael Adair, Steven Hartstein, Blake Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title_full | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title_fullStr | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title_full_unstemmed | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title_short | Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code |
title_sort | malware analyst's cookbook and dvd: tools and techniques for fighting malicious code |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412469 |
work_keys_str_mv | AT lighmichael malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode AT adairsteven malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode AT hartsteinblake malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode |