Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
SPISTREŚCI
Oautorachuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
XXI
Przedmowauuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
XXIII
PodziękowaniauuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuXXVII
Wprowadzenieuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
XXIX
Rozdział0
Elementarzanalizymalwareuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
1
CZĘŚĆ1
ANALIZAPODSTAWOWAuuuuuuuuuuuuuuuuuuuuuuuuuuu
7
Rozdział1
Podstawowetechnikistatyczneuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział2
Analizamalwarenamaszynachwirtualnychuuuuuuuuuuuuuuuuuuuuu
Rozdział3
Podstawowaanalizadynamicznauuuuuuuuuuuuuuuuuuuuuuuuuuuu
9
29
39
CZĘŚĆ2
ZAAWANSOWANAANALIZASTATYCZNAuuuuuuuuuuuuuuu
63
Rozdział4
Kursbłyskawicznyasemblerax86uuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział5
IDAProuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział6
RozpoznawaniewasemblerzekonstrukcjijęzykaCuuuuuuuuuuuuuuuu
Rozdział7
AnalizowaniemalwarewsystemieWindowsuuuuuuuuuuuuuuuuuuuu
65
85
107
133
CZĘŚĆ3
ZAAWANSOWANAANALIZADYNAMICZNAuuuuuuuuuuuuu
163
Rozdział8
Debugowanieuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział9
OllyDbguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział10DebugowaniejądrazapomocąWinDbguuuuuuuuuuuuuuuuuuuuuuu
165
177
201
CZĘŚĆ4
FUNKCJONALNOŚCIMALWAREuuuuuuuuuuuuuuuuuuuuuu
225
Rozdział11Zachowaniemalwareuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział12Ukryteuruchamianiemalwareuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział13Szyfrowaniedanychuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Rozdział14Sygnaturysieciowedotyczącemalwareuuuuuuuuuuuuuuuuuuuuuuu
227
249
263
291
Spistreści
V