Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book documents the best tools and tactics available for analyzing Android malware. It explains how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how to use static analysis to break apart the application/malware using reverse engineering tools and techniques to re-create the actual code and algorithms used. The book includes access to an online library that supplies readers with tools to perform their own analysis of the latest Android malware threats.
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.