Statements (39)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:book
|
gptkbp:author |
gptkb:Michael_Sikorski
gptkb:Andrew_Honig |
gptkbp:contains |
case studies
practical exercises tools for malware analysis |
gptkbp:country |
gptkb:United_States
|
gptkbp:format |
gptkb:print
ebook |
gptkbp:genre |
technical literature
|
gptkbp:hasCompanion |
https://www.nostarch.com/malware
|
https://www.w3.org/2000/01/rdf-schema#label |
Practical Malware Analysis
|
gptkbp:ISBN |
978-1-59327-290-6
|
gptkbp:language |
English
|
gptkbp:notableFor |
comprehensive guide to malware analysis
|
gptkbp:pages |
800
|
gptkbp:publicationDate |
2012
|
gptkbp:publisher |
gptkb:No_Starch_Press
|
gptkbp:recommendation |
security professionals
|
gptkbp:reviewedBy |
security community
|
gptkbp:subject |
computer security
malware analysis |
gptkbp:targetAudience |
students
security professionals reverse engineers |
gptkbp:teaches |
debugging
network analysis static analysis sandboxing reverse engineering dynamic analysis disassembly anti-debugging techniques anti-virtualization techniques code obfuscation techniques |
gptkbp:usedIn |
academic courses
cybersecurity training |
gptkbp:bfsParent |
gptkb:Michael_Sikorski
|
gptkbp:bfsLayer |
8
|