Statements (39)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:book
|
| gptkbp:author |
gptkb:Michael_Sikorski
gptkb:Andrew_Honig |
| gptkbp:contains |
case studies
practical exercises tools for malware analysis |
| gptkbp:country |
gptkb:United_States
|
| gptkbp:format |
gptkb:print
ebook |
| gptkbp:genre |
technical literature
|
| gptkbp:hasCompanion |
https://www.nostarch.com/malware
|
| gptkbp:ISBN |
978-1-59327-290-6
|
| gptkbp:language |
English
|
| gptkbp:notableFor |
comprehensive guide to malware analysis
|
| gptkbp:pages |
800
|
| gptkbp:publicationDate |
2012
|
| gptkbp:publisher |
gptkb:No_Starch_Press
|
| gptkbp:recommendation |
security professionals
|
| gptkbp:reviewedBy |
security community
|
| gptkbp:subject |
computer security
malware analysis |
| gptkbp:targetAudience |
students
security professionals reverse engineers |
| gptkbp:teaches |
debugging
network analysis static analysis sandboxing reverse engineering dynamic analysis disassembly anti-debugging techniques anti-virtualization techniques code obfuscation techniques |
| gptkbp:usedIn |
academic courses
cybersecurity training |
| gptkbp:bfsParent |
gptkb:Michael_Sikorski
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Practical Malware Analysis
|