-
1
-
2
-
3por Oktavianto, Digit“…This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. …”
Publicado 2013
Enlace del recurso
-
4por Dunham, Ken“…The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. …”
Publicado 2014
Enlace del recurso
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13por Alshahwan, Nadia, Barr, Earl T., Clark, David, Danezis, George, Menéndez, Héctor D.“…Malware concealment is the predominant strategy for malware propagation. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
14“…Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. …”
Enlace del recurso
-
15“…Software products from all vendors have vulnerabilities that can cause a security concern. Malware is used as a prime exploitation tool to exploit these vulnerabilities. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
16
-
17
-
18
-
19
-
20“…As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto