You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them. Following a crash course on using static and dynam...
Visual Threat Intelligence is an innovative, concise guide that combines detailed explanations, visual aids for improved retention, and real-world case examples. Discover the captivating world of threat intelligence in this visually engaging guide. Uniquely designed to be concise and easy to understand, this book combines the power of diagrams and graphics with practical examples to demystify complex concepts. Organized into key topics, it serves as a handy resource for anyone seeking to enhance their threat intelligence skills. Take it with you on the go and delve into the fundamentals of threat intelligence, explore the motivations of threat actors, and gain insights into crucial methodolo...
Paul, a brilliant cyber security analyst with a dark past as a hacker, is on the verge of proposing to Kat, his pregnant girlfriend. But fate intervenes when he is brutally attacked, seemingly without motive. His life unravels further when his team at Australia Bank uncover a data breach that holds them to ransom. As Paul dives into the incident investigation, he realizes that Kat has vanished. Desperate to find her, he descends into a murky underworld of secrets, betrayal, and greed. The shocking truth emerges: Kali Kartel, a ruthless hacking syndicate, are hell-bent on infiltrating the bank's systems and will stop at nothing to achieve their goals. Haunted by his past and racing against ti...
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you’ll learn: • How Windows boots—including 32-bit, 64-bit, and UEFI mode—and where to find vulnerabilities • The details of boot process security mechanisms like Secure Boot, includi...
Volume Four of the distinguished American Theatre: A Chronicle of Comedy and Drama series offers a thorough, candid, and fascinating look at the theater in New York during the last decades of the twentieth century.
Filled with gorgeous illustrations and concept art from the hit Netflix series, The Art and Making of Arcane is an immersive journey behind the scenes of the Emmy Award-winning Animated Series! The Art and Making of Arcane takes readers through the visual journey of Riot Games’ and Fortiche's revolutionary animated series. Featuring early art styles, evolving character designs, and jaw-dropping worldbuilding artwork, this volume is the definitive compendium of Arcane’s creative process and vision. Arcane and League of Legends fans alike will be amazed by the visual development of fan-favorite champions, the breathtaking cityscapes of Piltover and Zaun, and the riveting inventions of hext...
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build t...
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. Using extensive downloadable examples, they teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers."--Jacket.