Paperback: 544 pages
Publisher: McGraw-Hill Education; 1 edition (August 13, 2015)
Product Dimensions: 7.3 x 1.1 x 9 inches
Shipping Weight: 1.7 pounds (View shipping rates and policies)
Average Customer Review: 1.6 out of 5 stars See all reviews (5 customer reviews)
Best Sellers Rank: #1,268,318 in Books (See Top 100 in Books) #85 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration > Disaster & Recovery #188 in Books > Computers & Technology > Security & Encryption > Viruses #650 in Books > Computers & Technology > Databases & Big Data > Data Mining
Under a different title, I feel this book may have been okay (thus the two stars), but as it stands it is highly misleading. The most advanced concept covered in this book is arguably an in-depth copy/paste of the information contained within a PE file, which can easily be found online for free. In another section, the author walks you through the generation of an MD5 and SHA1 hash using Python without explaining fully what they're useful for. On the next page, he suggests downloading a piece of software and "[making] sure that the one you are downloading is legitimate and not carrying any malicious software." This would be a wonderful time to mention using the hashes HE JUST INTRODUCED in a practical manner, but instead he keeps right on trucking into another "lab". These "labs" that the book so lovingly totes are little more than an excuse to use the Courier font and tend to span fewer than 15-20 lines. Most merely follow the pattern of "Install tool, run tool, compare output to this!". The book reads as though it was written with what the author could think up off the top of his head and arranged into semi-topical groups rather than a natural flow of important information.Overall, I would NOT recommend this book to anyone with any sort of background in malware analysis. Those just starting out or looking for a quick refresher may find some useful tidbits here and there, but there are certainly better books available for the price. Furthermore, this book only focuses on Windows malware. This isn't necessarily a bad thing, just something that may be good to know ahead of time.
This book is in no regard about "Advanced" malware analysis like the title suggests. It is not even an introductory malware analysis book. All the book covers is how to install various tools that you would need to start with malware analysis 101. The books doesn't show disassembly of malware, it doesn't discuss any Windows API calls or any other Windows internals. The book doesn't even teach you what malware really is.The first chapter (page 6) contains the following gem: "Static analysis is the easiest [...] malware analysis process. [...] It is as easy as clicking some buttons or using a command line". This sums up the book pretty well: according to the author, malware analysis is mostly about installing tools and clicking some buttons. That might be part of it, but I don't consider that "Advanced Malware Analysis" or even "Malware Analysis".What does the book tackle then? The book is mostly filled with screenshots and very detailled tutorials how to install tools.You got screenshots of the Windows update settings, the Windows 7 security settings, the user account settings, the word option setting. You even got a full page dedicated to a screenshot of xcopy.exe copying some files.An then you have tutorials. There are 25 pages dedicated how to install and use gpg to encrypt malware for moving it from source to analysis machine. Or tutorials how to install InstallRite. Of course accompanied by four screenshots of the install wizard with the options to click Next or Cancel.Chapter 11, "Inspecting Static Malware", is finally dedicated to analysing malware.
Advanced Malware Analysis Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software Hacking: How to Computer Hack: An Ultimate Beginner's Guide to Hacking (Programming, Penetration Testing, Network Security) (Cyber Hacking with Virus, Malware and Trojan Testing) The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Virus and Malware Removal Made Easy (2015) Malware, Rootkits & Botnets A Beginner's Guide Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 Coastal and Estuarine Processes (Advanced Series on Ocean Engineering) (Advanced Series on Ocean Engineering (Paperback)) Copán: The History of an Ancient Maya Kingdom (School for Advanced Research Advanced Seminar Series) John Patrick's Advanced Craps: The Advanced Player's Guide to Winning Spanish Reader For Advanced Students (Spanish Reader for Beginners, Intermediate and Advanced Students nº 5) (Spanish Edition) Spanish Reader Advanced III: Spanish Short Stories (Spanish Reader for Beginners, Intermediate & Advanced Students nº 7) (Spanish Edition) FlightBridgeED, LLC - FP-C/CFRN Certification Review & Advanced Practice Update: FP-C, CCP-C, CFRN, CCRN, CEN, CTRN advanced certification review study guide Philosophies And Theories For Advanced Nursing Practice (Butts, Philosophies and Theories for Advanced Nursing Practice) Advanced Grammar in Use with Answers: A Self-Study Reference and Practice Book for Advanced Learners of English Advanced organic chemistry: Reactions, mechanisms and structure (McGraw;Hill series in advanced chemistry) Elementary Stochastic Calculus With Finance in View (Advanced Series on Statistical Science & Applied Probability, Vol 6) (Advanced Series on Statistical Science and Applied Probability)