Mobile Malware Attacks and Defense
Ken Dunham
- 出版商: Syngress Media
- 出版日期: 2008-10-01
- 定價: $1,980
- 售價: 8.0 折 $1,584
- 語言: 英文
- 頁數: 440
- 裝訂: Paperback
- ISBN: 1597492981
- ISBN-13: 9781597492980
-
相關分類:
資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$2,330$2,214 -
$2,360$2,242 -
$620$490 -
$670$637 -
$670$637 -
$980$774 -
$2,160$2,052 -
$1,850$1,758 -
$2,670$2,537 -
$1,488C++ GUI Programming with Qt 4, 2/e (Hardcover)
-
$2,180$2,071 -
$1,968Malware Forensics: Investigating and Analyzing Malicious Code
-
$1,400$1,330 -
$2,160$2,052 -
$1,155Hacking Exposed Linux, 3/e (Paperback)
-
$960$758 -
$1,580$1,501 -
$2,200$2,090 -
$1,580$1,501 -
$5,100$4,845 -
$780$616 -
$1,810$1,720 -
$299Android Application Development: Programming with the Google SDK (Paperback)
-
$1,960$1,862 -
$199Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback)
相關主題
商品描述
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
商品描述(中文翻譯)
惡意軟體已經進入了移動設備領域,安全風險正在迅速改變,對手機、PDA和其他移動設備的攻擊不斷出現。這本關於這一威脅不斷增長的書籍涵蓋了針對Symbian等操作系統和iPhone等新設備的各種惡意軟體。通過檢查過去、現在和未來的風險代碼,保護您在移動設備上進行的銀行業務、拍賣和其他活動。
* 可視化攻擊
將攻擊視為對最終用戶可見,包括變體的註釋。
* 移動惡意謠言和威脅時間軸
了解主要攻擊的歷史和新興威脅的前景。
* 移動惡意軟體家族概述
識別和了解移動惡意代碼群組及其變體。
* 移動惡意軟體分類
根據感染、分發和有效載荷策略對已知樣本進行分類。
* 網頁釣魚、短信釣魚和語音釣魚攻擊
檢測和減輕基於電話的網頁釣魚(語音釣魚)和短信釣魚(短信釣魚)技術。
* 操作系統和設備漏洞
分析獨特的操作系統安全問題,並檢查攻擊性移動設備威脅。
* 分析移動惡意軟體
設計一個用於動態軟體分析的沙盒,並使用MobileSandbox分析移動惡意軟體。
* 移動惡意軟體的法醫分析
對移動設備進行法醫分析,並了解移動法醫學的關鍵差異。
* 移動惡意軟體的調試和反彙編
使用IDA和其他工具對惡意代碼樣本進行反向工程分析。
* 移動惡意軟體的緩解措施
評估風險,了解對移動資產的威脅,防禦攻擊並處理事件。
* 了解快速新興移動攻擊的歷史和威脅風景
* 分析移動設備/平台的漏洞和利用
* 緩解當前和未來的移動惡意軟體威脅