Skip to Content
Malware: Fighting Malicious Code
book

Malware: Fighting Malicious Code

by Ed Skoudis, Lenny Zeltser
November 2003
Beginner to intermediate content levelBeginner to intermediate
672 pages
18h 40m
English
Pearson
Content preview from Malware: Fighting Malicious Code

Conclusion

The theories which I have expressed, and which appear to you to be so chimerical, are really extremely practical—so practical that I depend upon them for my bread and cheese.

—Sherlock Holmes, from A Study in Scarlet by Sir Arthur Conan Doyle, published in 1887

In this chapter, we've discussed how you can build a malware analysis lab of your very own. Perhaps I'm unusual, but I genuinely enjoy the countless hours I spend in my own lab, punching away at various types of malware to determine their hidden secrets. I feel like Sherlock Holmes, and my trusty lab acts like my assistant, Dr. Watson. Or perhaps I'm Watson and the lab is Holmes. Either way, with your own lab, you'll be able to follow this malware analysis process to see how ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin

Publisher Resources

ISBN: 0131014056Purchase book