The Art of Mac Malware, Volume 2 : Detecting Malicious Software - Patrick Wardle

The Art of Mac Malware, Volume 2

Detecting Malicious Software

By: Patrick Wardle

Paperback | 25 January 2025

At a Glance

Paperback


$90.75

or 4 interest-free payments of $22.69 with

 or 

Aims to ship in 15 to 25 business days

When will this arrive by?
Enter delivery postcode to estimate

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.

As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these constantly evolving and increasingly sophisticated threats is through learning and applying robust heuristic-based detection techniques.

To that end, Wardle draws upon decades of experience to guide you through the programmatic implementation of such detection techniques. By exploring how to leverage macOS's security-centric frameworks (both public and private), diving into key elements of behavioral-based detection, and highlighting relevant examples of real-life malware, Wardle teaches and underscores the efficacy of these powerful approaches.

Across 14 in-depth chapters, you'll learn how to-

  • Capture critical snapshots of system state to reveal the subtle signs of infection
  • Enumerate and analyze running processes to uncover evidence of malware
  • Parse the macOS's distribution and binary file formats to detect malicious anomalies
  • Utilize code signing as an effective tool to identify malware and reduce false positives
  • Write efficient code that harnesses the full potential of Apple's public and private APIs
  • Leverage Apple's Endpoint Security and Network Extension frameworks to build real-time monitoring tools

This comprehensive guide provides you with the knowledge to develop tools and techniques, and to neutralize threats before it's too late.

More in Network Security

Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Cybersecurity For Dummies : 2nd edition - Joseph Steinberg

RRP $52.95

$39.35

26%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Mastering Ethereum : Building Smart Contracts and Dapps - Andreas Antonopoulos
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
HTML & XHTML : Definitive Guide - Chuck Musciano

RRP $95.00

$43.25

54%
OFF
Information Modeling and Relational Databases : 2nd Edition - Terry Halpin
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.25

54%
OFF
Cyber Wars : Hacks that Shocked the Business World - Charles Arthur