Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

 

The book every malware analyst should keep handy.
–Richard Bejtlich, CSO, Mandiant & Founder of TaoSecurity

An excellent crash course in malware analysis.
–Dino Dai Zovi, Independent Security Consultant

. . . the most comprehensive guide to analysis of malware, offering detailed coverage of all the essential skills required to understand the specific challenges presented by modern malware.
–Chris Eagle, Senior Lecturer of Computer Science at the Naval Postgraduate School

A hands-on introduction to malware analysis. I’d recommend it to anyone who wants to dissect Windows malware.
–Ilfak Guilfanov, Creator of IDA Pro

. . . a great introduction to malware analysis. All chapters contain detailed technical explanations and hands-on lab exercises to get you immediate exposure to real malware.
–Sebastian Porst, Google Software Engineer

. . . brings reverse engineering to readers of all skill levels. Technically rich and accessible, the labs will lead you to a deeper understanding of the art and science of reverse engineering. I strongly recommend this book for beginners and experts alike.
–Danny Quist, PhD, Founder of Offensive Computing

If you only read one malware book or are looking to break into the world of malware analysis, this is the book to get.
–Patrick Engbretson, IA Professor at Dakota State University and Author of The Basics of Hacking and Pen Testing

. . . an excellent addition to the course materials for an advanced graduate level course on Software Security or Intrusion Detection Systems. The labs are especially useful to students in teaching the methods to reverse engineer, analyze and understand malicious software.
–Sal Stolfo, Professor, Columbia University

Download Links

Link 1

Link 2

Link 3

The Code Book

 

Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history’s most fascinating story of deception and cunning: the science of cryptography–the encoding and decoding of private information. Based on The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, this version has been abridged and slightly simplified for a younger audience Continue reading “The Code Book” »

Writing Security Tools and Exploits

 

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.

The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.

* Provides readers with working code to develop and modify the most common security tools including Nmap and Nessus
* Learn to reverse engineer and write exploits for various operating systems, databases, and applications
* Automate reporting and analysis of security log files

Download Links

Link 1

Link 2

Link 3