Cargando…

Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks /

Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Born, Michael (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2019.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1121138878
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 191005s2019 enk o 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d UKMGB  |d OCLCO  |d EBLCP  |d OCLCQ  |d N$T  |d OCLCO  |d OCLCF  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB9G5323  |2 bnb 
016 7 |a 019559727  |2 Uk 
020 |a 1789809495 
020 |a 9781789809497  |q (electronic bk.) 
020 |z 9781789807608  |q (pbk.) 
029 1 |a CHNEW  |b 001069935 
029 1 |a CHVBK  |b 577491784 
029 1 |a UKMGB  |b 019559727 
035 |a (OCoLC)1121138878 
037 |a 9781789809497  |b Packt Publishing 
050 4 |a QA76.774.L46 
082 0 4 |a 005.432  |2 23 
049 |a UAMI 
100 1 |a Born, Michael,  |e author. 
245 1 0 |a Binary analysis cookbook :  |b actionable recipes for disassembling and analyzing binaries for security risks /  |c Michael Born. 
260 |a Birmingham, UK :  |b Packt Publishing Ltd.,  |c 2019. 
300 |a 1 online resource (388 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing VirtualBox on Mac; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it ... ; How it works ... ; There's more ... 
505 8 |a See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the dependencies and the tools; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the code examples; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the EDB Debugger; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also 
505 8 |a Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT & T syntax; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introduction to the IA-32 registers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing common IA-32 instructions; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Making IA-32 system calls on Linux; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing the ELF 32-bit specification; Getting ready 
505 8 |a How to do it ... How it works ... ; There's more ... ; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing common IA64 instructions; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Making IA64 system calls on Linux; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also 
505 8 |a Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Information gathering; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Static analysis; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Dynamic analysis; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Iterating each step; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Automating methodology tasks 
500 |a Getting ready. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Linux. 
630 0 7 |a Linux  |2 fast 
650 0 |a Operating systems (Computers) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Open source software. 
650 0 |a Software engineering. 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels libres. 
650 6 |a Génie logiciel. 
650 7 |a operating systems.  |2 aat 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Open source software  |2 fast 
650 7 |a Operating systems (Computers)  |2 fast 
650 7 |a Software engineering  |2 fast 
776 0 8 |i Print version:  |a Born, Michael.  |t Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks.  |d Birmingham : Packt Publishing, Limited, ©2019  |z 9781789807608 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789807608/?ar  |z Texto completo 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2255806  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36824792 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5904525 
938 |a EBSCOhost  |b EBSC  |n 2255806 
994 |a 92  |b IZTAP