توضیحات
This book teaches defenders how to analyze and reverse‑engineer malicious software and criminal toolsets to uncover attacker tactics, techniques, and procedures (TTPs). It covers static and dynamic analysis methods, disassembly and debugging, unpacking and deobfuscation, memory forensics, and malware behavior profiling. The text also links analysis findings to practical defensive actions: threat hunting, incident response, signature and detection rule creation, and hardening recommendations. Legal, ethical, and safety considerations for handling malicious code are discussed, making it a useful resource for security analysts, incident responders, and threat intelligence practitioners.
نقد و بررسیها
هنوز بررسیای ثبت نشده است.