|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn689007482 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101203s2011 ne a ob 001 0 eng d |
010 |
|
|
|a 2010036631
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d E7B
|d EBLCP
|d OCLCQ
|d MHW
|d YDXCP
|d OCLCQ
|d REDDC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d VLB
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d OCLCF
|d INT
|d COO
|d OCLCQ
|d OCLCO
|d WYU
|d OCLCQ
|d VT2
|d OCLCQ
|d BRF
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1065958362
|a 1107349167
|a 1153022743
|a 1229182834
|a 1240526554
|
020 |
|
|
|a 9781597495752
|q (electronic bk.)
|
020 |
|
|
|a 1597495751
|q (electronic bk.)
|
020 |
|
|
|z 9781597495745
|
020 |
|
|
|z 1597495743
|
020 |
0 |
|
|a 9781282880092
|q (online)
|
020 |
|
|
|a 1282880098
|
029 |
1 |
|
|a AU@
|b 000048044683
|
029 |
1 |
|
|a AU@
|b 000053265791
|
029 |
1 |
|
|a CHNEW
|b 000608625
|
029 |
1 |
|
|a DEBSZ
|b 372741215
|
029 |
1 |
|
|a DEBSZ
|b 430908695
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110310205765
|
035 |
|
|
|a (OCoLC)689007482
|z (OCoLC)1065958362
|z (OCoLC)1107349167
|z (OCoLC)1153022743
|z (OCoLC)1229182834
|z (OCoLC)1240526554
|
050 |
|
4 |
|a QA76.9.A25
|b M487 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Metula, Erez.
|
245 |
1 |
0 |
|a Managed code rootkits :
|b hooking into runtime environments /
|c Erez Metula.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Syngress,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xiii, 316 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"--Provided by publisher.
|
505 |
0 |
|
|a Front Cover; Managed Code Rootkits; Copyright; Table of Contents; Acknowledgements; About the Author; Part I: Overview; Chapter 1. Introduction; Chapter 2. Managed Code Rootkits; Part II: Malware Development; Chapter 3. Tools of the Trade; Chapter 4. Runtime Modification; Chapter 5. Manipulating the Runtime; Chapter 6. Extending the Language with a Malware API; Chapter 7. Automated Framework Modification; Chapter 8. Advanced Topics; Part III: Countermeasures; Chapter 9. Defending against MCRs; Part IV: Where Do We Go from Here?; Chapter 10. Other Uses of Runtime Modification; Index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Common Language Runtime.
|
630 |
0 |
7 |
|a Common Language Runtime
|2 fast
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Virtual computer systems
|x Security measures.
|
650 |
|
0 |
|a Rootkits (Computer software)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Systèmes virtuels (Informatique)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Trousses administrateur pirate.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Rootkits (Computer software)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Metula, Erez.
|t Managed code rootkits.
|d Amsterdam ; Boston : Syngress, ©2011
|z 9781597495745
|w (DLC) 2010036631
|w (OCoLC)635451806
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495752/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL610554
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10427971
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 345028
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3535371
|
994 |
|
|
|a 92
|b IZTAP
|