- Home
- Computers
- Programming
- The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
The Art of Mac Malware, Volume 2 (Detecting Malicious Software)
List Price:
$59.99
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Patrick Wardle
Format:
Paperback
Pages:
376
Publisher:
No Starch Press (February 25, 2025)
Language:
English
Audience:
General/trade
ISBN-13:
9781718503786
ISBN-10:
1718503784
Weight:
24.6oz
Dimensions:
7" x 9.25" x 0.84"
File:
RandomHouse-PRH_Book_Company_PRH_PRT_Onix_full_active_D20260405T164802_155746771-20260405.xml
Folder:
RandomHouse
List Price:
$59.99
Country of Origin:
United States
Pub Discount:
65
Case Pack:
18
As low as:
$46.19
Publisher Identifier:
P-RH
Discount Code:
A
QuickShip:
Yes
Imprint:
No Starch Press
Overview
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.
As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these constantly evolving and increasingly sophisticated threats is through learning and applying robust heuristic-based detection techniques.
To that end, Wardle draws upon decades of experience to guide you through the programmatic implementation of such detection techniques. By exploring how to leverage macOS’s security-centric frameworks (both public and private), diving into key elements of behavioral-based detection, and highlighting relevant examples of real-life malware, Wardle teaches and underscores the efficacy of these powerful approaches.
Across 14 in-depth chapters, you’ll learn how to:
This comprehensive guide provides you with the knowledge to develop tools and techniques, and to neutralize threats before it’s too late.
As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these constantly evolving and increasingly sophisticated threats is through learning and applying robust heuristic-based detection techniques.
To that end, Wardle draws upon decades of experience to guide you through the programmatic implementation of such detection techniques. By exploring how to leverage macOS’s security-centric frameworks (both public and private), diving into key elements of behavioral-based detection, and highlighting relevant examples of real-life malware, Wardle teaches and underscores the efficacy of these powerful approaches.
Across 14 in-depth chapters, you’ll learn how to:
- Capture critical snapshots of system state to reveal the subtle signs of infection
- Enumerate and analyze running processes to uncover evidence of malware
- Parse the macOS’s distribution and binary file formats to detect malicious anomalies
- Utilize code signing as an effective tool to identify malware and reduce false positives
- Write efficient code that harnesses the full potential of Apple’s public and private APIs
- Leverage Apple’s Endpoint Security and Network Extension frameworks to build real-time monitoring tools
This comprehensive guide provides you with the knowledge to develop tools and techniques, and to neutralize threats before it’s too late.








