Product description ※Please note that product information is not in full comprehensive meaning because of the machine translation.
Information Science
[Introduction to the Contents]
This book covers a wide range of fields so that it can respond to the "needs" of various readers such as "What is Malware?" and "What is Malware?" from the general public who want to learn from the "super" basics, such as "What is Malware?", to IT staff who want to understand the modus operandi and mechanism of the latest threats, and to security engineers who are about to start malware analysis. The 『 Malware textbook 』, which is highly popular as a book that conveys knowledge about malware through thorough dissection from the basics to the attack method and the analysis method, has been enhanced with the revised edition. The content related to malware has been added, including the contents related to malware such as the hot ChatGPT. It contains "Transition and Connection of Ransom Attack Groups" at the end.
Introduction
Chapter 1 : Overview of Malware
Malware is classified by behavior and infection routes
Chapter 2 : Various Malware
Malware Exploits to Compromise PCs
Malware Exploits Web Services
Closely Connected Malware with Stolen Information
Column History of Ransom Wear
Columns Threaten with Stolen Information
The History of Ransom Wear
Columns Threaten with Information Malware Blocks Malware Analysis
How "APIhashing" Hides Your Movements
Chapter 8 : Malware in Real Attacks
What Is Ekans's Malware?
What Is the Laguna Locker that Attacked a Domestic Company
What is the Malware Masquerading as the Tokyo Olympics?
What is the LockBit2.0?
Appearance of Column LockBit3.0
Chapter 9 : Methods of Malware Analysis
Methods of Malware Analysis
Methods of Malware Analysis
Examining file information "Surface Analysis"
Examining malware behavior "Dynamic Analysis"
Examining malware behavior "Static Analysis"
Reading malware code
Extracting connection destinations from document-type malware
Detecting unknown malware with free tools
Chapter 10-9 : How to Begin Malware Analysis
Malware Analysis Tutorial
Conclusion
Two books recommended as the next steps in this book
Indexes
Links between Fold-in Malware Attack Groups ChatGPT Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom Ransom