000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250606b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781718503267 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.88 |
Item number |
CUC |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cucci, Kyle |
245 ## - TITLE STATEMENT |
Title |
Evasive malware : understanding deceptive and self-defending threats |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
No Starch Press, |
Date of publication, distribution, etc |
2024 |
Place of publication, distribution, etc |
San Francisco : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxix, 456 p. ; |
Other physical details |
ill., |
Dimensions |
24 cm |
365 ## - TRADE PRICE |
Price amount |
69.99 |
Price type code |
$ |
Unit of pricing |
89.00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them. Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Malware Prevention |
|
Topical term or geographic name as entry element |
Networking |
|
Topical term or geographic name as entry element |
Security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |