Binary analysis cookbook : actionable recipes for disassembling and analyzing binaries for security risks /
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code,...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing Ltd.,
2019.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBSCO_on1121138878 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 191005s2019 enk o 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d UKMGB |d OCLCO |d EBLCP |d OCLCQ |d N$T |d OCLCO |d OCLCF |d OCLCQ |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO | ||
015 | |a GBB9G5323 |2 bnb | ||
016 | 7 | |a 019559727 |2 Uk | |
020 | |a 1789809495 | ||
020 | |a 9781789809497 |q (electronic bk.) | ||
020 | |z 9781789807608 |q (pbk.) | ||
029 | 1 | |a CHNEW |b 001069935 | |
029 | 1 | |a CHVBK |b 577491784 | |
029 | 1 | |a UKMGB |b 019559727 | |
035 | |a (OCoLC)1121138878 | ||
037 | |a 9781789809497 |b Packt Publishing | ||
050 | 4 | |a QA76.774.L46 | |
082 | 0 | 4 | |a 005.432 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Born, Michael, |e author. | |
245 | 1 | 0 | |a Binary analysis cookbook : |b actionable recipes for disassembling and analyzing binaries for security risks / |c Michael Born. |
260 | |a Birmingham, UK : |b Packt Publishing Ltd., |c 2019. | ||
300 | |a 1 online resource (388 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
520 | |a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. | ||
505 | 0 | |a Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing VirtualBox on Mac; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it ... ; How it works ... ; There's more ... | |
505 | 8 | |a See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the dependencies and the tools; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the code examples; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing the EDB Debugger; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also | |
505 | 8 | |a Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT & T syntax; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introduction to the IA-32 registers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing common IA-32 instructions; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Making IA-32 system calls on Linux; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing the ELF 32-bit specification; Getting ready | |
505 | 8 | |a How to do it ... How it works ... ; There's more ... ; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing common IA64 instructions; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Making IA64 system calls on Linux; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also | |
505 | 8 | |a Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Information gathering; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Static analysis; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Dynamic analysis; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Iterating each step; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Automating methodology tasks | |
500 | |a Getting ready. | ||
588 | 0 | |a Print version record. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
630 | 0 | 0 | |a Linux. |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Open source software. | |
650 | 0 | |a Software engineering. | |
650 | 6 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels libres. | |
650 | 6 | |a Génie logiciel. | |
650 | 7 | |a operating systems. |2 aat | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Open source software |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
776 | 0 | 8 | |i Print version: |a Born, Michael. |t Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks. |d Birmingham : Packt Publishing, Limited, ©2019 |z 9781789807608 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781789807608/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2255806 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH36824792 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5904525 | ||
938 | |a EBSCOhost |b EBSC |n 2255806 | ||
994 | |a 92 |b IZTAP |