Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard.
Material type: TextPublisher: Indianapolis, IN : Wiley Publishing Inc., 2011Description: xxvi, 716 pages : illustrations ; 24 cm + 1 DVD-ROM (4 3/4 in.)ISBN:- 9780470613030
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 MAL (Browse shelf(Opens below)) | Available | BU-LIB15348 | |||
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 MAL (Browse shelf(Opens below)) | Available | BU-LIB15351 | |||
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 MAL (Browse shelf(Opens below)) | Available | BU-LIB15346 | |||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 MAL (Browse shelf(Opens below)) | Available | BU-LIB15340 | |||
Books | Botho University Lesotho Reference | Information Technology | REF 00.8 MAL (Browse shelf(Opens below)) | 1 | Available | BK003161 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 00.8 MAL (Browse shelf(Opens below)) | 2 | Available | Bk000221 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 00.8 MAL (Browse shelf(Opens below)) | 3 | Available | BK001126 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 00.8 MAL (Browse shelf(Opens below)) | 4 | Available | BK000222 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 00.8 MAL (Browse shelf(Opens below)) | 5 | Available | BK000263 |
Browsing Botho University Botswana shelves, Shelving location: Open Shelves, Collection: Information Technology Close shelf browser (Hides shelf browser)
A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
There are no comments on this title.