×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Windows APT Warfare. Identify and prevent Windows APT attacks effectively Sheng-Hao Ma, Ziv Chang, Federico Maggi

(ebook) (audiobook) (audiobook) Książka w języku 1
Windows APT Warfare. Identify and prevent Windows APT attacks effectively Sheng-Hao Ma, Ziv Chang, Federico Maggi - okladka książki

Windows APT Warfare. Identify and prevent Windows APT attacks effectively Sheng-Hao Ma, Ziv Chang, Federico Maggi - okladka książki

Windows APT Warfare. Identify and prevent Windows APT attacks effectively Sheng-Hao Ma, Ziv Chang, Federico Maggi - audiobook MP3

Windows APT Warfare. Identify and prevent Windows APT attacks effectively Sheng-Hao Ma, Ziv Chang, Federico Maggi - audiobook CD

Autorzy:
Sheng-Hao Ma, Ziv Chang, Federico Maggi
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
258
Dostępne formaty:
     PDF
     ePub
An Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive information. Preventing APTs requires a strong foundation of basic security techniques combined with effective security monitoring. This book will help you gain a red team perspective on exploiting system design and master techniques to prevent APT attacks. Once you’ve understood the internal design of operating systems, you’ll be ready to get hands-on with red team attacks and, further, learn how to create and compile C source code into an EXE program file. Throughout this book, you’ll explore the inner workings of how Windows systems run and how attackers abuse this knowledge to bypass antivirus products and protection.
As you advance, you’ll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware.
By the end of this book, you’ll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks.

Wybrane bestsellery

O autorze książki

Sheng-Hao Ma is currently working as a threat researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
116,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.