Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
Android Malware and Analysis
Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
Android Malware and Analysis
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book documents the best tools and tactics available for analyzing Android malware.
Andere Kunden interessierten sich auch für
- Abu Sayed MahfuzSoftware Quality Assurance192,99 €
- Mark S MerkowSecure and Resilient Software Development141,99 €
- Bhavani ThuraisinghamDeveloping and Securing the Cloud174,99 €
- Abhay BhargavPCI Compliance163,99 €
- Balaji RaghunathanThe Complete Book of Data Anonymization117,99 €
- Mano PaulThe 7 Qualities of Highly Secure Software82,99 €
- Bhavani ThuraisinghamSecure Data Provenance and Inference Control with Semantic Web171,99 €
-
-
-
This book documents the best tools and tactics available for analyzing Android malware.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 242
- Erscheinungstermin: 4. November 2014
- Englisch
- Abmessung: 244mm x 159mm x 25mm
- Gewicht: 558g
- ISBN-13: 9781482252194
- ISBN-10: 1482252198
- Artikelnr.: 40872207
- Verlag: CRC Press
- Seitenzahl: 242
- Erscheinungstermin: 4. November 2014
- Englisch
- Abmessung: 244mm x 159mm x 25mm
- Gewicht: 558g
- ISBN-13: 9781482252194
- ISBN-10: 1482252198
- Artikelnr.: 40872207
Ken Dunham has nearly two decades of experience on the front lines of information security. He currently works as a principal incident intelligence engineer for iSIGHT Partners and as CEO of the nonprofit Rampart Research. Dunham regularly briefs top-level executives and officials in Fortune 500 companies and manages major newsworthy incidents globally. Formerly, he led training efforts as a contractor for the U.S. Air Force for U-2 reconnaissance, Warthog Fighter, and Predator (UAV) programs. Concurrently, he also authored top Web sites and freeware antiviruses and other software, and has taught at multiple levels on a diverse range of topics. Dunham is the author of multiple books, is a regular columnist, and has authored thousands of incident and threat reports over the past two decades. He holds a master's of teacher education and several certifications: CISSP, GCFA Gold (forensics), GCIH Gold (Honors) (incident handling), GSEC (network security), GREM Gold (reverse engineering), and GCIA (intrusion detection). He is also the founder and former president of Idaho InfraGard and Boise ISSA, a member of multiple security organizations globally, and former Wildlist Organization reporter. In 2014, Dunham was awarded the esteemed ISSA International Distinguished Fellow status. Dunham is also the founder of the nonprofit organization Rampart Research, which meets the needs of over 1,000 cybersecurity experts globally. Shane Hartman, CISSP, GREM, is a malware engineer at iSIGHT Partners, focusing on the analysis and characteristics of malicious code. He has been in the information technology field for 20 years covering a wide variety of areas including network engineering and security. He is also a frequent speaker at local security events and teaches security courses at the University of South Florida. Hartman holds a master's degree in digital forensics from the University of Central Florida. Jose Morales has been a researcher in cybersecurity since 1998, focusing on behavior-based malware analysis and detection and suspicion assessment theory and implementation. He graduated with his Ph.D. in computer science in 2008 from Florida International University and completed a postdoctoral fellowship at the Institute for Cyber Security at the University of Texas at San Antonio. He is a senior member of the Association of Computing Machinery (ACM) and IEEE. Manu Quintans is a malware researcher linked from many years ago to the malware scene, as a collaborator with groups such Hacktimes.com and Malware Intelligence, developing expertise and disciplines related to malware research and response. He currently works as an intelligence manager for a Big4, performing campaign tracking of malware and supporting incidence response teams in the Middle East. He also chairs a nonprofit organization called mlw.re dedicated to the study of new online threats to assist organizations and computer emergency response teams (CERTs) combating such threats. Tim Strazzere is a lead research and response engineer at Lookout Mobile Security. Along with writing security software, he specializes in reverse engineering and malware analysis. Some interesting past projects include reversing the Android Market protocol, Dalvik decompilers, and memory manipulation on mobile devices. Past speaking engagements have included DEFCON, BlackHat, SyScan, HiTCON, and EICAR.
Introduction to the Android Operating System and Threats. Malware Threats,
Hoaxes, and Taxonomy. Open Source Tools. Static Analysis. Android Malware
Evolution. Android Malware Trends and Reversing Tactics. Behavioral
Analysis. Building Your Own Sandbox. Case Study Examples.
Hoaxes, and Taxonomy. Open Source Tools. Static Analysis. Android Malware
Evolution. Android Malware Trends and Reversing Tactics. Behavioral
Analysis. Building Your Own Sandbox. Case Study Examples.
Introduction to the Android Operating System and Threats. Malware Threats,
Hoaxes, and Taxonomy. Open Source Tools. Static Analysis. Android Malware
Evolution. Android Malware Trends and Reversing Tactics. Behavioral
Analysis. Building Your Own Sandbox. Case Study Examples.
Hoaxes, and Taxonomy. Open Source Tools. Static Analysis. Android Malware
Evolution. Android Malware Trends and Reversing Tactics. Behavioral
Analysis. Building Your Own Sandbox. Case Study Examples.