Cargando…

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses...

Descripción completa

Detalles Bibliográficos
Autores principales: Ligh, Michael, Adair, Steven, Hartstein, Blake
Lenguaje:eng
Publicado: John Wiley & Sons Inc 2010
Materias:
Acceso en línea:http://cds.cern.ch/record/1412469
_version_ 1780923891983581184
author Ligh, Michael
Adair, Steven
Hartstein, Blake
author_facet Ligh, Michael
Adair, Steven
Hartstein, Blake
author_sort Ligh, Michael
collection CERN
description A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle agains
id cern-1412469
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2010
publisher John Wiley & Sons Inc
record_format invenio
spelling cern-14124692021-04-22T00:45:12Zhttp://cds.cern.ch/record/1412469engLigh, MichaelAdair, StevenHartstein, BlakeMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious CodeComputing and ComputersA computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle againsJohn Wiley & Sons Incoai:cds.cern.ch:14124692010
spellingShingle Computing and Computers
Ligh, Michael
Adair, Steven
Hartstein, Blake
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title_full Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title_fullStr Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title_full_unstemmed Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title_short Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
title_sort malware analyst's cookbook and dvd: tools and techniques for fighting malicious code
topic Computing and Computers
url http://cds.cern.ch/record/1412469
work_keys_str_mv AT lighmichael malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode
AT adairsteven malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode
AT hartsteinblake malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode