Shop now Shop now Cloud Drive Photos Shop now Shop now Learn More Shop now Shop now Shop Fire Shop Kindle Shop now Shop now

Customer Reviews

5.0 out of 5 stars
11
5.0 out of 5 stars
5 star
11
4 star
0
3 star
0
2 star
0
1 star
0

Your rating(Clear)Rate this item
Share your thoughts with other customers

There was a problem filtering reviews right now. Please try again later.

TOP 500 REVIEWERon 28 January 2014
This is the most riveting and easy to understand book. Yes, the topic is demanding, but this takes you step by step through the code, with amazing diagrams and visual guides. There's no waffle either.
0Comment| 2 people found this helpful. Was this review helpful to you?YesNoReport abuse
VINE VOICEon 23 November 2015
This book is an essential if you work in the computer security field and are required to understand and examine Malware. Students studying Malware Analysis should consider this as a must read. The book is very comprehensive and is very well laid out.
0Comment|Was this review helpful to you?YesNoReport abuse
on 23 August 2013
Currently working my way through this book. It progresses at a good pace and explains a complex subject well. The authors clearly have a wealth of practical experience in this area and this comes through in the explanations, examples and labs. If you're looking to get into malware analysis, this is probably the best book out there at the moment (Malware Analysts Cookbook is also great).
0Comment| 2 people found this helpful. Was this review helpful to you?YesNoReport abuse
on 18 August 2013
There are only so many books you can read on the why of malware before you need to get your hands dirty to understand the how of malware.

This is where I have found some books to be lacking - good on theory, but how do you get started analysing malware?
Given the complexities of the subject the authors have done a thorough job, something evident from the fact that the book is 766 pages and there is no fluff.

Highlights:

- advice on how to approach analysing a suspicious file.
- plenty of tools and examples for practical investigation.
- explains how malware authors use certain features of the operating system to their advantage and how to uncover these.
- excellent chapter on packers and unpacking.
- ways to thwart anti-VM techniques.
- there is a companion website where you can download example code to use with the labs.

To get the most out of the book you will need to do the labs and you should have some knowledge of programming, although there is a crash course in x86 assembly language programming and its vital to understand this for the later chapters.
0Comment| 4 people found this helpful. Was this review helpful to you?YesNoReport abuse
on 1 June 2015
This book is amazing. It is the first book you will need to get into malware analysis, and one of the books you will always need to have handy. Simply a must-have.
0Comment|Was this review helpful to you?YesNoReport abuse
on 25 July 2016
Really well explained and detailed lab analysis walkthrough.
0Comment|Was this review helpful to you?YesNoReport abuse
on 15 February 2015
Every malware analyst should keep it on hand.
0Comment|Was this review helpful to you?YesNoReport abuse
on 24 June 2015
Stunning book and must have.
0Comment|Was this review helpful to you?YesNoReport abuse
on 28 January 2015
good product
0Comment|Was this review helpful to you?YesNoReport abuse
on 12 October 2014
great book and good seller
0Comment|Was this review helpful to you?YesNoReport abuse

Sponsored Links

  (What is this?)