Recognizing covert methods of launching malware attacks

This chapter from Practical Malware Analysis offers a detailed look at various ways covert malware attacks are launched. Recognizing launching techniques is critical to finding malware on a live system. Note: The publisher has provided a promo code in this PDF for 30% off the purchase price of the book.

Title: Practical Malware Analysis
ISBN: 9781593272906
Published: February 2012
Authors: Michael Sikorski and Andrew Honig
Chapter: “Covert Malware Launching”
Published by No Starch Press

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
No Starch Press
Topic:
Security
Format:
PDF