CHAPTER 10
Detecting the Threat
|
We’ll Cover
Detecting anomalies in the network and in the host
Pinpointing the malware by looking for suspicious behavior
The goal of using computer forensics in malware detection
The purpose of classifying the malware based on its attack directives
Chapter 9 laid down the foundation of protecting the organization ...
Get Malware, Rootkits & Botnets A Beginner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.