#11 in Computer security & encryption books
Use arrows to jump to the previous/next product

Reddit mentions of Malware Forensics: Investigating and Analyzing Malicious Code

Sentiment score: 2
Reddit mentions: 3

We found 3 Reddit mentions of Malware Forensics: Investigating and Analyzing Malicious Code. Here are the top ones.

Malware Forensics: Investigating and Analyzing Malicious Code
Buying options
View on Amazon.com
or
    Features:
  • Used Book in Good Condition
Specs:
Height9.25195 Inches
Length7.51967 Inches
Number of items1
Weight3.089999064192 Pounds
Width1.4314932 Inches

idea-bulb Interested in what Redditors like? Check out our Shuffle feature

Shuffle: random products popular on Reddit

Found 3 comments on Malware Forensics: Investigating and Analyzing Malicious Code:

u/[deleted] · 18 pointsr/netsec

It really depends on what niche you're looking on covering. It's difficult, I feel, to brush up on "infosec" to any level of practical proficiency without focusing on a few subsets. Based on your interests, I would recommend the following books.

General Hacking:

Hacking Exposed

The Art of Exploitation

The Art of Deception



Intrusion Detection / Incident Response:

Network Flow Analysis

The Tao of Network Security Monitoring

Practical Intrusion Analysis

Real Digital Forensics


Reverse Engineering:

Reversing: Secrets of Reverse Engineering

The Ida Pro Book

Malware Analyst Cookbook

Malware Forensics



Digital Forensics:

File System Forensic Analysis

Windows Forensic Analysis

Real Digital Forensics

The Rootkit Arsenal


Hope this helps. If you're a University student, you might have access to Safari Books Online, which has access to almost all of these books, and more. You can also purchase a personal subscription for like $23 a month. It's a bit pricey, but they have an awesome library of technical books.

u/sirfitchalot · 2 pointsr/homelab

The books mentioned in your other thread and by /u/dreddriver are good and I would like to add RTFM and Malware Analysis: Investigating and Analyzing Malicious Code. The latter is a little dated but still relevant as far as live memory analysis goes, which is the bees knees in modern forensics.

Make sure to ISOLATE and SANDBOX. Download Metasploitable and Ultimate Lamp.

This is a good guide--

https://community.rapid7.com/docs/DOC-2196

and this

http://resources.infosecinstitute.com/hacking-lab/

Keep up to date on CVE's

And as always, follow security guys on their blogs, Twitter, and whatever. People are super crafty and always coming up with new ideas.