語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Breaking Ransomware = explore ways to find and exploit flaws in a ransomware attack (english edition) /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Breaking Ransomware/ Jitender Narula, Atul Narula.
其他題名:
explore ways to find and exploit flaws in a ransomware attack (english edition) /
作者:
Narula, Jitender.
其他作者:
Narula, Atul,
面頁冊數:
1 online resource (337 pages)
標題:
COMPUTERS / Forensics. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000413.html
ISBN:
9789355513625
Breaking Ransomware = explore ways to find and exploit flaws in a ransomware attack (english edition) /
Narula, Jitender.
Breaking Ransomware
explore ways to find and exploit flaws in a ransomware attack (english edition) /[electronic resource] :Jitender Narula, Atul Narula. - 1 online resource (337 pages)
Includes bibliographical references and index.
Breaking Ransomware: explore ways to find and exploit flaws in a ransomware attack (english edition) -- Dedication Page -- About the Author and Co-author -- About the Reviewer -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Section I: Ransomware Understanding -- Chapter 1: Warning Signs, Am I Infected? -- Chapter 2: Ransomware Building Blocks -- Chapter 3: Current Defense in Place -- Chapter 4: Ransomware Abuses Cryptography -- Chapter 5: Ransomware Key Management -- Section II: Ransomware Internals -- Chapter 6: Internal Secrets of Ransomware -- Chapter 7: Portable Executable Insides -- Chapter 8: Portable Executable Sections -- Section III: Ransomware Assessment -- Chapter 9: Performing Static Analysis -- Chapter 10: Perform Dynamic Analysis -- Section IV: Ransomware Forensics -- Chapter 11: What’s in the Memory -- Chapter 12: LockCrypt 2.0 Ransomware Analysis -- Chapter 13: Jigsaw Ransomware Analysis -- Section V: Ransomware Rescue -- Chapter 14: Experts Tips to Manage Attacks -- Index.
Access restricted to authorized users and institutions.
Crack a ransomware by identifying and exploiting weaknesses in its design Key Features ? Get an overview of the current security mechanisms available to prevent ransomware digital extortion. ? Explore different techniques to analyze a ransomware attack. ? Understand how cryptographic libraries are misused by malware authors to code ransomwares. Description Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware. What you will learn ? Get familiar with the structure of Portable Executable file format. ? Understand the crucial concepts related to Export Directory and Export Address Table. ? Explore different techniques used for ransomware static and dynamic analysis. ? Learn how to investigate a ransomware attack. ? Get expert tips to mitigate ransomware attacks. Who this book is for This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg an
Mode of access: World Wide Web.
ISBN: 9789355513625Subjects--Topical Terms:
1483900
COMPUTERS / Forensics.
Index Terms--Genre/Form:
554714
Electronic books.
Dewey Class. No.: 005.7
Breaking Ransomware = explore ways to find and exploit flaws in a ransomware attack (english edition) /
LDR
:04034nam a2200277 i 4500
001
1157307
006
m eo d
007
cr cn |||m|||a
008
250717s2023 ob 000 0 eng d
020
$a
9789355513625
020
$a
9789355513656
035
$a
BPB0000413
041
0
$a
eng
082
0 0
$a
005.7
100
1
$a
Narula, Jitender.
$3
1483897
245
1 0
$a
Breaking Ransomware
$h
[electronic resource] :
$b
explore ways to find and exploit flaws in a ransomware attack (english edition) /
$c
Jitender Narula, Atul Narula.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2023.
264
4
$c
©2023
300
$a
1 online resource (337 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Breaking Ransomware: explore ways to find and exploit flaws in a ransomware attack (english edition) -- Dedication Page -- About the Author and Co-author -- About the Reviewer -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Section I: Ransomware Understanding -- Chapter 1: Warning Signs, Am I Infected? -- Chapter 2: Ransomware Building Blocks -- Chapter 3: Current Defense in Place -- Chapter 4: Ransomware Abuses Cryptography -- Chapter 5: Ransomware Key Management -- Section II: Ransomware Internals -- Chapter 6: Internal Secrets of Ransomware -- Chapter 7: Portable Executable Insides -- Chapter 8: Portable Executable Sections -- Section III: Ransomware Assessment -- Chapter 9: Performing Static Analysis -- Chapter 10: Perform Dynamic Analysis -- Section IV: Ransomware Forensics -- Chapter 11: What’s in the Memory -- Chapter 12: LockCrypt 2.0 Ransomware Analysis -- Chapter 13: Jigsaw Ransomware Analysis -- Section V: Ransomware Rescue -- Chapter 14: Experts Tips to Manage Attacks -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Crack a ransomware by identifying and exploiting weaknesses in its design Key Features ? Get an overview of the current security mechanisms available to prevent ransomware digital extortion. ? Explore different techniques to analyze a ransomware attack. ? Understand how cryptographic libraries are misused by malware authors to code ransomwares. Description Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware. What you will learn ? Get familiar with the structure of Portable Executable file format. ? Understand the crucial concepts related to Export Directory and Export Address Table. ? Explore different techniques used for ransomware static and dynamic analysis. ? Learn how to investigate a ransomware attack. ? Get expert tips to mitigate ransomware attacks. Who this book is for This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg an
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Forensics.
$2
bisacsh
$3
1483900
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Computer Simulation.
$2
bisacsh
$3
1483899
650
7
$a
COMPUTERS / Information Technology.
$2
bisacsh
$3
1057148
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Narula, Atul,
$e
author
$3
1483898
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000413.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入