• 参考価格: ¥ 5,990
  • OFF: ¥ 132 (2%)
通常配送無料 詳細
残り2点(入荷予定あり) 在庫状況について
この商品は、Amazon.co.jp が販売、発送します。 ギフトラッピングを利用できます。
数量:1
Malware Analyst's Cookboo... がカートに入りました
+ ¥ 257 関東への配送料
コンディション: 中古品: 良い
コメント: ---東京より発送---外観にスレ・薄ヤケ・汚れ少々ありますが、概ね良好です。付属ディスク開封済(盤面概ね良好)
この商品をお持ちですか? マーケットプレイスに出品する
裏表紙を表示 表紙を表示
サンプルを聴く 再生中... 一時停止   Audible オーディオエディションのサンプルをお聴きいただいています。
3点すべてのイメージを見る

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (英語) ペーパーバック – 2010/11/2

5つ星のうち 4.7 3件のカスタマーレビュー

その他(2)の形式およびエディションを表示する 他のフォーマットおよびエディションを非表示にする
Amazon 価格
新品 中古品
Kindle版
"もう一度試してください。"
ペーパーバック
"もう一度試してください。"
¥ 5,858
¥ 3,901 ¥ 3,980

AmazonStudent

Amazon Student会員なら、この商品は+10%Amazonポイント還元(Amazonマーケットプレイスでのご注文は対象外)。無料体験でもれなくポイント1,000円分プレゼントキャンペーン実施中。


click to open popover

よく一緒に購入されている商品

  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • +
  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
総額: ¥12,614
選択された商品をまとめて購入

Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。

  • Apple
  • Android
  • Android

無料アプリを入手するには、Eメールアドレスを入力してください。



【Amazonランキング大賞 2016上半期】入賞発表!
洋書総合は『The Rider Tarot Deck』 が堂々の1位。 洋書総合ランキングへ

商品の説明

内容紹介

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.

  • Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
  • Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
  • Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions

Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

著者について

Michael Hale Ligh is a malicious code analyst at Verisign iDefense and Chief of Special Projects at MNIN Security.

Steven Adair is a member of the Shadowserver Foundation and frequently analyzes malware and tracks botnets. He also investigates cyber attacks of all kinds with an emphasis on those linked to cyber espionage.

Blake Hartstein is the author of multiple security tools and a Rapid Response Engineer at Verisign iDefense, where he responds to malware incidents.

Matthew Richard has authored numerous security tools and also ran a managed security service for banks and credit unions.


登録情報

  • ペーパーバック: 744ページ
  • 出版社: Wiley; 1版 (2010/11/2)
  • 言語: 英語
  • ISBN-10: 0470613033
  • ISBN-13: 978-0470613030
  • 発売日: 2010/11/2
  • 商品パッケージの寸法: 18.8 x 3.9 x 23.5 cm
  • おすすめ度: 5つ星のうち 4.7 3件のカスタマーレビュー
  • Amazon 売れ筋ランキング: 洋書 - 41,064位 (洋書の売れ筋ランキングを見る)
  •  カタログ情報を更新する画像についてフィードバックを提供する、または さらに安い価格について知らせる

  • 目次を見る

この商品を見た後に買っているのは?

カスタマーレビュー

5つ星のうち 4.7
あなたのご意見やご感想を教えてください

トップカスタマーレビュー

形式: ペーパーバック
『アナライジング・マルウェア』のような入門書を読了し、実際にマルウェア解析を行うようになった
中級者がさらに効率的に・時間を節約してマルウェアを解析するための必読書であります。

ですので、本書をマルウェア解析の入門書として取り扱うのは非常に難しいと思います。
きちんとしてマルウェア解析の基礎技能を学習した上で、本書を読むとより充実した時間と
実益がもたらされるでしょう。特に7章以降です。
コメント 3人のお客様がこれが役に立ったと考えています. このレビューは参考になりましたか? はい いいえ 評価を送る...
フィードバックありがとうございました。
申し訳ありませんが、お客様の投票の記録に失敗しました。もう一度試してください。
違反を報告
形式: ペーパーバック
星の数は気にしないで下さい。
まだ深く読んだわけじゃないので、
とりあえず面白いだろうという希望的観測で星5個つけました。

ざっと見た感じ、新しい技術があるのかどうかはわかりません。
英語もサッパリな自分ですが、とりあえずソースコードが多いのと
コマンド入力の手順により結果を見ていくみたいな方式なので
プログラミングができてLinux系OSが触れればある程度分かるんじゃないかと思います。
英語だからとかで恐れず、説明よりコードが多いので
躊躇してる人は買いじゃないでしょうか。

今冬に日本人著者らからこれと似たような本が出るらしいので
比較して、どちらかを批判するのも一興

※余談
なか見検索でも分かると思いますが、だいたいPythonで書かれています。
Python>C>Perl
コメント 1人のお客様がこれが役に立ったと考えています. このレビューは参考になりましたか? はい いいえ 評価を送る...
フィードバックありがとうございました。
申し訳ありませんが、お客様の投票の記録に失敗しました。もう一度試してください。
違反を報告
形式: ペーパーバック Amazonで購入
レビュー遅れて申し訳ありません。商品の受け取りも指定された日時にまでに到着しました。内容はかなり濃いと思うので、プログラミングがわかってないと、大変かと思いますが、ここまで書き込まれた本はないと思います
コメント このレビューは参考になりましたか? はい いいえ 評価を送る...
フィードバックありがとうございました。
申し訳ありませんが、お客様の投票の記録に失敗しました。もう一度試してください。
違反を報告

Amazon.com で最も参考になったカスタマーレビュー (beta)

Amazon.com: 5つ星のうち HASH(0x82ba976c) 43 件のカスタマーレビュー
89 人中、88人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち HASH(0x82b2760c) Current Best of Breed for Technical Malware Books 2010/10/31
投稿者 D. Craig - (Amazon.com)
形式: ペーパーバック Amazonで購入
I have just received this book and have not yet worked my way through all the chapters, but I have reviewed the contents and tool DVD. I teach college classes on Network and Computer forensics from a survey level through a hard-core programming level. I have likely purchased or been sent most of the books in this area, and this book does stand out for the following reasons.

1. The material is up-to-date. Tools and malware resources change on an almost daily basis and you need to get books that reflect current resources and best practices. This book does a very good job covering the current tools and resources. It provides the web addresses for the various tools and resources discussed in each chapter. It also refers to current research, articles, and conference material in the areas covered in the chapters.

2. The topics covered are comprehensive. The book includes topics on anonymizing (the first chapter), classifying malware, shellcode, DLL code injection, debugging, how to safely run malware in a virtual environment, dumping memory and memory forensics, debugging kernel code, etc. The topics are collected into 18 chapters and are very complete.

3. The focus of this book is performing analysis of malware (which includes a wide variety of exploit types) and creating/using the tools to perform this analysis. Numerous examples are given showing how the analysis can be done, and some background information is presented as needed.

4. The book assumes the reader has brains. Too many "Computer Forensics" books are a waste of time for someone that already has a background in programming, networking, etc. They (the other Forensics books) often start their discussion of Network Forensics with a definition of what a network is ("A network sends packets between computers..."). Give me a break. This book assumes the reader already has a level of knowledge that is appropriate to anyone really working in this field. However, the authors do a good job explaining what needs to be explained in the course of presenting the topics. They don't talk down to the reader.

5. The book has a wealth of examples. Each chapter presents the topics by showing examples as well as showing how to get and install the necessary tools.

6. The book balances using pre-written tools with create-your-own tools. The latter include scripts in Python and programs in C/C++. The authors indicate where to get various relevant libraries which can be used to create or customize tools. This book is not just a collection of tools, but shows how to use the tools, analysis techniques, etc.

7. The book is very reasonably priced for the quality of content and the extra DVD. The price from Amazon is under $40 and the retail price is about $60. However, even at $60 this book is a bargain. Even if you just used the web addresses for the lists of tools presented in each chapter, the amount of time would take to locate and document the huge number of forensics/hacking tools presented in this book, is worth more than the book's price.

8. The book presents a huge amount of material. Almost every page is crammed with information and examples. Frankly, this book presents more information in one chapter than most other books do in their entirety, and this book has 18 chapters. The chapters are written so they are independent of each other and you can select the chapter you want to work through without reading previous chapters.

9. The tool focus is open-source and platform independent. The authors stay with open-source tools and try to reference tools that can run on both Linux and Windows. However, they also use the best tools available for a specific task, even if the tool only runs under Linux or only under Windows.

Reader Background:
There are enough varied topics in this book that readers with different levels of knowledge can benefit. The authors assume the reader has a background in basic networking, understands operating systems (both Windows and Unix), understands programming (Python, C/C++, Assembly), and understand processor basics (registers, the stack, etc). However, these assumptions are not barriers to getting something out of this book. Beginners will find the book too difficult, but would profit by just downloading the various tools referenced in the chapters.

Bottom line:
* If you are doing forensic analysis on Malware you should purchase this book (for the chapters on debugging, memory forensics, and malware forensics)
* If you are working in the network/computer security area you should purchase this book (for the chapters on setting up a malware lab, classifying malware, and setting up a malware sandbox)
* If you are interested in the programming aspects of malware you should purchase this book (for the chapters on DLLs and debugging malware code and on code injection)
* If (and I hesitate to include this) you want to be a hacker you should purchase this book and read the entire thing.
32 人中、31人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち HASH(0x82b89060) If you need some practical tips for working with malware this is your cookbook! 2010/11/13
投稿者 David Nardoni - (Amazon.com)
形式: ペーパーバック Amazonで購入
The Malware Analyst's Cookbook is the best book I have read when it comes to practical techniques for working with malware. This book give many practical examples to helping forensic examiners, incident responders, malware analysts or others on how to deal with malware. This book touches so many great areas when it comes to malware analysis it is hard to focus on highlighting them all.

One suggestion for those looking to purchase this book, it would help you to gain a mild understanding of python as many of the very great tools contained within the book rely on python. It is by no means necessary to understand python to use the tools but it would be helpful to better understand what the tools are doing.

I found the 4 chapters on memory analysis to be completely awesome! I have not seen such a wealth of information on memory analysis in once place. The chapters on memory analysis go from the basic analysis of memory dump to exploring code injection and rootkits to pulling registry and network artifacts from memory.

The book does a great job of introducing the reader to multiple ways in dealing with malware from using tools for classification, scanning with AV engines and sandboxes to working with DLLs and malware debugging. I really liked how when a tool is introduced then authors then usually have a script to automate much of the process. The DVD that comes with the book is worth the price of the book just by itself.

If you work with malware in any capacity I think this book with benefit you as it has so much to offer in so many areas when it comes to fighting malicious code.
22 人中、19人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち HASH(0x82b27990) Buy this book! Read this book! 2010/11/15
投稿者 A. Student - (Amazon.com)
形式: ペーパーバック
Malware is a highly prevalent threat and the techniques for studying it have tended to be obscure and rather difficult to ferret out. This book brings the techniques into the light and diligent study will add many useful tactics to your repetoire. The book is organized into "recipes" that are grouped into 18 chapters. Each recipe covers how to perform a particular "thing" clearly with illustrations, code/output samples and references for more detail. The tools DVD is organized into chapters matching the text and individual recipes refer you to the matching tool on the DVD.

It is a technical book so be warned that its benefits will be reaped only by dilignet study and working through the recipes.

Highly recommended for people enganged in or interested in malware analysis or even the more general topics of how malware operates. The script for automating analysis of suspect malware by multiple antivirus scanners from the command line (Chapter 4) are worth the price of the book alone.
8 人中、8人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち HASH(0x82b89f00) There's a recipe for that! 2010/12/12
投稿者 Dustin Schultz - (Amazon.com)
形式: ペーパーバック
This is an excellent book on the topic of malware analysis. The book is loaded with content at close to 700 pages. There's a recipe for everything! Everything from how to setup a malware lab to how to perform memory forensics on a rootkit.

The book is suitable for all levels of anyone interested in security and malware analysis. The recipe style of the book makes it easy to quickly jump to a section you are interested in or need at that moment or it can be used to skip sections you're not interested in without losing anything.

The provided DVD is actually useful. It provides a number of custom written Python scripts that the authors took consider time to write. You can easily add these to your malware analysis toolkit for easier malware analysis and increased productivity.
7 人中、7人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち HASH(0x82b8d444) Critical for any malware analyst 2010/12/19
投稿者 Curtis Shaffer - (Amazon.com)
形式: ペーパーバック
This book is a must for anyone that is tasked with doing malware analysis either by analyzing files or network traffic. The authors have made this process almost as easy as step by step. I love this book and continue to reference it over and over again. It is on my bookshelf for review and I require anyone on my team to read this as a prerequisite to doing malware analysis.

Their techniques have helped me by solving problems I was having directly with analysis tools, as well as indirectly with other methods I have put in place. This book is a very easy read and the open source tools are very beneficial.

Excellent work!
これらのレビューは参考になりましたか? ご意見はクチコミでお聞かせください。


フィードバック