Evasive malware : understanding deceptive and self-defending threats (Record no. 34003)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250606b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781718503267
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.88
Item number CUC
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Cucci, Kyle
245 ## - TITLE STATEMENT
Title Evasive malware : understanding deceptive and self-defending threats
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc No Starch Press,
Date of publication, distribution, etc 2024
Place of publication, distribution, etc San Francisco :
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 456 p. ;
Other physical details ill.,
Dimensions 24 cm
365 ## - TRADE PRICE
Price amount 69.99
Price type code $
Unit of pricing 89.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them. Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Malware Prevention
Topical term or geographic name as entry element Networking
Topical term or geographic name as entry element Security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2025-05-26 KB 6229.11 005.88 CUC 035546 2025-06-06 Books

Powered by Koha