TOP
紅利積點抵現金,消費購書更貼心
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity

Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity

商品資訊

定價
:NT$ 2750 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點:82 點
商品簡介

商品簡介

Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers

Key Features:

- Learn how to develop and program Windows malware applications using hands-on examples

- Explore methods to bypass security mechanisms and make malware undetectable on compromised systems

- Understand the tactics and tricks of real adversaries and APTs and apply their experience in your operations

- Purchase of the print or Kindle book includes a free PDF eBook

Book Description:

Malware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.

This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you'll focus on the ethical considerations that ethical hackers must uphold. You'll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software.

By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.

What You Will Learn:

- Familiarize yourself with the logic of real malware developers for cybersecurity

- Get to grips with the development of malware over the years using examples

- Understand the process of reconstructing APT attacks and their techniques

- Design methods to bypass security mechanisms for your red team scenarios

- Explore over 80 working examples of malware

- Get to grips with the close relationship between mathematics and modern malware

Who this book is for:

This book is for penetration testers, exploit developers, ethical hackers, red teamers, and offensive security researchers. Anyone interested in cybersecurity and ethical hacking will also find this book helpful. Familiarity with core ethical hacking and cybersecurity concepts will help you understand the topics discussed in this book more easily.

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 2750
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區