Learn more Shop now Shop now Shop now Shop now Shop now Shop now Shop now Learn More Shop now Shop now Learn more Shop Fire Shop Kindle Martine McCutcheon Learn more Fitbit

Customer reviews

5.0 out of 5 stars
13
5.0 out of 5 stars
5 star
13
4 star
0
3 star
0
2 star
0
1 star
0

There was a problem filtering reviews right now. Please try again later.

on 23 August 2013
Currently working my way through this book. It progresses at a good pace and explains a complex subject well. The authors clearly have a wealth of practical experience in this area and this comes through in the explanations, examples and labs. If you're looking to get into malware analysis, this is probably the best book out there at the moment (Malware Analysts Cookbook is also great).
0Comment| 5 people found this helpful. Was this review helpful to you?YesNoReport abuse
on 10 May 2017
This book is amazing, i read a lot of books but this one is the best who read this he understands everything.
0Comment|Was this review helpful to you?YesNoReport abuse
on 28 January 2014
This is the most riveting and easy to understand book. Yes, the topic is demanding, but this takes you step by step through the code, with amazing diagrams and visual guides. There's no waffle either.
0Comment| 3 people found this helpful. Was this review helpful to you?YesNoReport abuse
on 1 August 2017
Very nice book full of details. The only drawback is that a book like this becomes outdated in few weeks due to technical advancement in the field. Recommended.
0Comment| One person found this helpful. Was this review helpful to you?YesNoReport abuse
on 18 August 2013
There are only so many books you can read on the why of malware before you need to get your hands dirty to understand the how of malware.

This is where I have found some books to be lacking - good on theory, but how do you get started analysing malware?
Given the complexities of the subject the authors have done a thorough job, something evident from the fact that the book is 766 pages and there is no fluff.

Highlights:

- advice on how to approach analysing a suspicious file.
- plenty of tools and examples for practical investigation.
- explains how malware authors use certain features of the operating system to their advantage and how to uncover these.
- excellent chapter on packers and unpacking.
- ways to thwart anti-VM techniques.
- there is a companion website where you can download example code to use with the labs.

To get the most out of the book you will need to do the labs and you should have some knowledge of programming, although there is a crash course in x86 assembly language programming and its vital to understand this for the later chapters.
0Comment| 8 people found this helpful. Was this review helpful to you?YesNoReport abuse
VINE VOICEon 23 November 2015
This book is an essential if you work in the computer security field and are required to understand and examine Malware. Students studying Malware Analysis should consider this as a must read. The book is very comprehensive and is very well laid out.
0Comment|Was this review helpful to you?YesNoReport abuse
on 1 June 2015
This book is amazing. It is the first book you will need to get into malware analysis, and one of the books you will always need to have handy. Simply a must-have.
0Comment|Was this review helpful to you?YesNoReport abuse
on 25 July 2016
Really well explained and detailed lab analysis walkthrough.
0Comment|Was this review helpful to you?YesNoReport abuse
on 15 February 2015
Every malware analyst should keep it on hand.
0Comment|Was this review helpful to you?YesNoReport abuse
on 24 June 2015
Stunning book and must have.
0Comment|Was this review helpful to you?YesNoReport abuse



Need customer service? Click here

Sponsored Links

  (What is this?)