CHAPTER 10
Detecting the Threat
We’ll Cover
image  Detecting anomalies in the network and in the host
image  Pinpointing the malware by looking for suspicious behavior
image  The goal of using computer forensics in malware detection
image  The purpose of classifying the malware based on its attack directives
Chapter 9 laid down the foundation of protecting the organization ...

Get Malware, Rootkits & Botnets A Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.