Backsecurity

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

malware analysisThis page features the latest and most popular books on malware analysis, helping readers understand malicious software and strengthen their cybersecurity skills. With over 600 words focused on malware analysis books, this SEO-optimized description showcases top titles covering reverse engineering, static and dynamic analysis, assembler languages, decoding algorithms, and more.

Bestsellers

A range of our top selling security products from the last year.

(1-1 of 7) 
Mastering Malware Analysis
Mastering Malware Analysis
Sep 2022Ellipse572 PagesEllipseHalf Star 5

$43.99
Learning Malware Analysis
Learning Malware Analysis
Jun 2018Ellipse510 PagesEllipseHalf Star 5

$43.99
Antivirus Bypass Techniques
Antivirus Bypass Techniques
Jul 2021Ellipse242 Pages

$29.99
Malware Analysis Techniques
Malware Analysis Techniques
Jun 2021Ellipse282 Pages

$38.99
Mastering Malware Analysis
Mastering Malware Analysis
Jun 2019Ellipse562 Pages

$38.99
Cuckoo Malware Analysis
Cuckoo Malware Analysis
Oct 2013Ellipse142 Pages

$24.99
Windows Malware Analysis Essentials
Windows Malware Analysis Essentials
Sep 2015Ellipse330 Pages

$43.99

Rising Stars

Recently released security books which are getting a lot of attention.

(1-1 of 10) 
Attacking and Exploiting Modern Web Applications
Attacking and Exploiting Modern Web Appl ...
Aug 2023Ellipse338 PagesEllipseHalf Star 5

$31.99
Automotive Cybersecurity Engineering Handbook
Automotive Cybersecurity Engineering Han ...
Oct 2023Ellipse392 PagesEllipseHalf Star 5

$43.99
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Official Google Cloud Certified Professi ...
Aug 2023Ellipse496 Pages

$47.99
Cloud Penetration Testing for Red Teamers
Cloud Penetration Testing for Red Teamer ...
Nov 2023Ellipse298 Pages

$39.99
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
ISACA Certified in Risk and Information ...
Sep 2023Ellipse316 Pages

$43.99
Burp Suite Cookbook
Burp Suite Cookbook
Oct 2023Ellipse450 PagesEllipseHalf Star 5

$39.99
Building and Automating Penetration Testing Labs in the Cloud
Building and Automating Penetration Test ...
Oct 2023Ellipse562 Pages

$39.99
Ethical Hacking Workshop
Ethical Hacking Workshop
Oct 2023Ellipse220 Pages

$43.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 PagesEllipseHalf Star 5

$39.99
Implementing DevSecOps Practices
Implementing DevSecOps Practices
Dec 2023Ellipse258 Pages

$27.99

Audience Favourites

Our most rated security products by our Customers.

(1-1 of 2) 
Learning Malware Analysis
Learning Malware Analysis
Jun 2018Ellipse510 Pages

$43.99
Mastering Malware Analysis
Mastering Malware Analysis
Sep 2022Ellipse572 Pages

$43.99

Quick Learns

Our security books which are under 200 pages long.

(1-1 of 1) 
Cuckoo Malware Analysis
Cuckoo Malware Analysis
Oct 2013Ellipse142 Pages

$24.99

Express Tutorials

Learn core security skills and be productive within two hours.

(1-1 of 1) 
Introduction to Malware Analysis for Incident Responders
Introduction to Malware Analysis for Inc ...
May 2018Ellipse91 minutes

$188.99

Career Pathways

A collection of reading lists made by our expert authors to help get you your next job.
Mastering CybersecurityMastering CybersecurityMastering Cybersecurity
Mastering CybersecurityThis comprehensive reading list is curated for those looking to get started with Cybersecurity. It offers unique insights on the evolution of the threat landscape, providing expert tips and techniques to help you develop defense strategies against th ...
How to Become an Ethical HackerHow to Become an Ethical HackerHow to Become an Ethical Hacker
How to Become an Ethical HackerExplore this reading list to learn legal hacking, enterprise defense testing, and penetration techniques in a controlled environment. It covers practicing ethical hacking, intermediate-level penetration testing, web app vulnerability exploitation, an ...
Become a Kali Linux NinjaBecome a Kali Linux NinjaBecome a Kali Linux Ninja
Become a Kali Linux NinjaMaster the art of ethical hacking with the ins and outs of pentesting with Kali Linux. It leads from advanced to complex penetration testing methods, covering wireless devices, web, and AWS cloud.
Kickstart Your CyberSecurity CareerKickstart Your CyberSecurity CareerKickstart Your CyberSecurity Career
Kickstart Your CyberSecurity CareerCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This reading list consistss of books wr ...
Digital Forensics and Incident Response MasterclassDigital Forensics and Incident Response MasterclassDigital Forensics and Incident Response Masterclass
Digital Forensics and Incident Response MasterclassLearn digital forensics and incident response with real-life scenarios. Ideal for cybersecurity enthusiasts and business security professionals.

Popular Authors (5)

(1 -1 of 5) 

Ms. Vandana Verma Sehgal
LinkedinGithub
1. https://www.linkedin.com/in/vandana-verma/?originalSubdomain=in 2. https://infosecvandana.com/ 2. https://github.com/vermava 3. https://twitter.com/infosecvandana 4. https://www.youtube.com/channel/UCyr-gas4Un-3YBEDIUQtNjg 5. https://www.youtube.com/watch?v=MIyM6JKv7pQ 6. https://www.youtube.com/watch?v=FHKG3b07PtA 7. https://pl-pl.facebook.com/bloggersmeetup/videos/vandana-verma-sehgal-of-owasp-explains-why-app-modernization-is-so-critical-to-l/490587351941275/ 8. https://www.rsaconference.com/experts/vandana-verma-sehgal 9. https://owasp.o...
Most popular book by Ms. Vandana Verma Sehgal
Implementing DevSecOps Practices
Kamil Mrzygłód
LinkedinGithub
Kamil Mrzygłód is a skilled software developer, architect, and Microsoft Azure MVP. He is focused on delivering fast, reliable, and flexible cloud solutions based on the Microsoft Azure platform. He has spoken at multiple conferences and meetups, working on open source software (OSS) projects and driving workshops for different people and companies. In recent years, he has developed an interest in Azure serverless architectures, data analysis, and big data components. Currently, he works as an independent cloud consultant for various clients. H...
Most popular book by Kamil Mrzygłód
Hands-On Azure for Developers
Stian Thorgersen
LinkedinGithub
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing o...
Most popular book by Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
José Manuel Ortega
LinkedinGithub
Jos Manuel Ortega is a software engineer, focusing on new technologies, open source, security, and testing. His career goal has been to specialize in Python and security testing projects. In recent years, he has developed an interest in security development, especially in pentesting with Python. Currently, he is working as a security tester engineer and his functions in the role involves the analysis and testing of the security of applications in both web and mobile environments. He has taught at university level and collaborated with the offic...
Most popular book by José Manuel Ortega
Mastering Python for Networking and Security
Viktor Hedberg
LinkedinGithub
Viktor is a Cyber Security Consultant / Security Advisor for Truesec, based in Sweden. Specializing in Microsoft technologies whether on-premises or in the cloud, Viktor strives to secure all workloads as well as taking part in Incident Response to help organizations respond, recover, and rebuild from an attack. He has 10 years of experience in the IT industry, during this time he has worked for a number of government entities and as a consultant helped a number of global organizations with designing and implementing various Microsoft workloads...
Most popular book by Viktor Hedberg
Microsoft Information Protection Administrator SC-400 Certification Guide

malware analysis concept discovery