ODBIERZ TWÓJ BONUS :: »

Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers Joas A Santos, Filipi Pires

Język publikacji: 1
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers Joas A Santos, Filipi Pires - okladka książki

Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers Joas A Santos, Filipi Pires - okladka książki

Autorzy:
Joas A Santos, Filipi Pires
Serie wydawnicze:
Learning
Ocena:
Stron:
590
Defense evasion techniques refer to methods used by attackers to evade detection by security measures and avoid being blocked or removed from a targeted system or network.
The book will address Defense Evasion concepts and techniques and will focus on topics like antivirus, EDR, Firewalls, Application Controls, WAF, and finally methods used by malware to avoid reverse engineering and other security controls. The readers will find it very helpful in understanding Security Concept Basics, Windows APIs and Sysinternals.
By the end of the book the readers will be comfortable securing their environments by understanding their security measures and detections against those who try to fly under the radar.

Wybrane bestsellery

O autorach książki

Joas is an Offensive Security Analyst in Unico IDTech, Red Team Leader in HackerSec, Speaker and Author with more 90 certified in Cyber Security, Mitre Att&ck Contributor and Independent Information Security Research.
Filipi has been working as Security and Threat Researcher, Founder at Black&White Technology, Cybersecurity Advocate, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate. International Speaker at Security and New technologies events in many countries such as US, Canada, France, Spain, Germany, Poland, and others. He has served as a University Professor in Graduation and MBA courses at Brazilian colleges. Additionally, he is a creator and instructor of the course - Malware Attack Types with Kill Chain Methodology (PentestMagazine), PowerShell and Windows for Red Teamers (PentestMagazine) and Malware Analysis - Fundamentals (HackerSec).

Zobacz pozostałe książki z serii Learning

Packt Publishing - inne książki

Zamknij

Przenieś na półkę
Dodano produkt na półkę
Usunięto produkt z półki
Przeniesiono produkt do archiwum
Przeniesiono produkt do biblioteki

Zamknij

Wybierz metodę płatności

Sposób płatności
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.